Malware & RansomwareHIGH

Storm-1175 Exploits Zero-Days to Deploy Medusa Ransomware

Featured image for Storm-1175 Exploits Zero-Days to Deploy Medusa Ransomware
#Medusa ransomware#Storm-1175#zero-day vulnerabilities#Microsoft#credential theft

Original Reporting

THThe Hacker News

AI Intelligence Briefing

CyberPings AIΒ·Reviewed by Rohit Rana
Severity LevelHIGH

Significant risk β€” action recommended within 24-48 hours

🦠
🦠 MALWARE PROFILE
Malware NameMedusa
Malware TypeRansomware
Threat ActorStorm-1175
Target PlatformWindows, Linux
Delivery MethodExploiting vulnerabilities
Persistence MechanismCreating new user accounts, deploying web shells
C2 Infrastructureβ€”
CapabilitiesData exfiltration, ransomware deployment
IOCs Availableβ€”
Detection Rateβ€”
MITRE ATT&CKT1071.001 (Application Layer Protocol), T1086 (PowerShell), T1059.001 (Command-Line Interface)
🎯

Basically, a hacking group is using hidden weaknesses in software to quickly spread ransomware.

Quick Summary

Storm-1175, a China-linked group, is exploiting zero-day vulnerabilities to deploy Medusa ransomware rapidly. Targeting critical sectors, their tactics pose severe security risks. Organizations must enhance defenses to mitigate these threats.

What Happened

A China-based threat actor known as Storm-1175 has been linked to a series of high-velocity attacks utilizing both zero-day and N-day vulnerabilities. This group has gained notoriety for deploying Medusa ransomware and has successfully infiltrated various sectors, particularly healthcare, education, professional services, and finance in countries like Australia, the UK, and the US.

Who's Being Targeted

The attacks primarily focus on organizations with exposed internet-facing systems. Storm-1175 has demonstrated a keen ability to identify vulnerable perimeter assets, leading to successful breaches. Their operational tempo is notably high, often executing attacks within 24 hours of gaining initial access.

How It Works

Storm-1175 exploits a range of vulnerabilities, including:

  • CVE-2023-21529 (Microsoft Exchange Server)
  • CVE-2023-27351 and CVE-2023-27350 (Papercut)
  • CVE-2024-21887 (Ivanti Connect Secure)
  • CVE-2025-10035 (Fortra GoAnywhere MFT)

In some cases, they have exploited vulnerabilities before they were publicly disclosed. The group often chains multiple exploits together, such as OWASSRF, to enhance their post-compromise activities.

Signs of Infection

Indicators that organizations may be compromised include:

  • Unusual user account activity or new accounts created without authorization.
  • Modifications to Windows Firewall settings allowing Remote Desktop Protocol (RDP) access.
  • Unexpected network traffic involving living-off-the-land binaries (LOLBins) like PowerShell.

How to Protect Yourself

To defend against Storm-1175's tactics, organizations should:

  • Regularly patch systems to mitigate known vulnerabilities.
  • Monitor network traffic for unusual patterns, especially involving RDP.
  • Implement strict access controls and regularly audit user accounts.
  • Utilize advanced threat detection tools to identify and block malicious activities.

The Bigger Picture

The implications of Storm-1175's operations are significant. Their use of Remote Monitoring and Management (RMM) tools for malicious purposes blurs the line between legitimate and malicious traffic. This trend highlights the need for organizations to scrutinize their RMM tools and ensure robust security measures are in place to prevent exploitation.

Overall, the rapid deployment of Medusa ransomware by Storm-1175 underscores the evolving threat landscape and the necessity for proactive cybersecurity measures.

πŸ” How to Check If You're Affected

  1. 1.Check for unusual account activity or unauthorized user accounts.
  2. 2.Monitor firewall logs for unexpected RDP access attempts.
  3. 3.Review network traffic for signs of LOLBins being used.

🏒 Impacted Sectors

HealthcareEducationFinance

Pro Insight

πŸ”’ Pro insight: Storm-1175's rapid exploitation of zero-days underscores the urgency for organizations to adopt a proactive patching strategy and enhance perimeter defenses.

Sources

Original Report

THThe Hacker News
Read Original

Related Pings

HIGHMalware & Ransomware

Malicious Chrome Extension - Injects Malware in Browsers

A new malicious Chrome extension, Amazing Refresh, is hijacking user clicks and monetizing traffic without consent. This poses risks to both users and website owners. Immediate action is needed to remove the extension and protect users.

Scott HelmeΒ·
HIGHMalware & Ransomware

NightSpire Ransomware - Analyzing Evolving IOCs and TTPs

A recent NightSpire ransomware incident shows how evolving tactics complicate detection and recovery. Organizations must adapt to these changes to protect their data.

Huntress BlogΒ·
HIGHMalware & Ransomware

Malware Campaign - Fake Software Installers Deliver RATs

A malware campaign tricks users into downloading fake software installers that deliver RATs and Monero miners. This long-running operation has earned the attacker significant revenue. Stay vigilant to avoid falling victim to such scams.

Cyber Security NewsΒ·
HIGHMalware & Ransomware

Storm-1175 - High-Tempo Medusa Ransomware Operations Unveiled

Storm-1175 is rapidly executing ransomware attacks, moving from initial access to deployment within 24 hours. Targeting critical sectors, they exploit vulnerabilities before patches are applied.

Microsoft Security BlogΒ·
HIGHMalware & Ransomware

Trojanized PyPI AI Proxy Steals User Data Silently

A malicious Python package named hermes-px has been found on PyPI, masquerading as a privacy-focused AI tool. Developers are unknowingly at risk of data breaches, as the package exfiltrates sensitive information. Immediate action is required to mitigate potential damage.

Cyber Security NewsΒ·
HIGHMalware & Ransomware

Malicious Strapi NPM Packages Target Guardarian Users

36 malicious NPM packages targeting Strapi users have been discovered, capable of executing shells and harvesting credentials. The attack exploits Redis and PostgreSQL vulnerabilities, posing significant risks to Guardarian's ecosystem.

SecurityWeekΒ·