Malware & RansomwareHIGH

Storm-1175 - High-Tempo Medusa Ransomware Operations Unveiled

Featured image for Storm-1175 - High-Tempo Medusa Ransomware Operations Unveiled
#Storm-1175#Medusa ransomware#CVE-2023-21529#CVE-2023-27351#CVE-2025-10035

Original Reporting

MSMicrosoft Security Blog·Microsoft Threat Intelligence

AI Intelligence Briefing

CyberPings AI·Reviewed by Rohit Rana
Severity LevelHIGH

Significant risk — action recommended within 24-48 hours

🎯

Basically, a group called Storm-1175 uses security flaws to quickly spread ransomware and steal data.

Quick Summary

Storm-1175 is exploiting web vulnerabilities for fast ransomware attacks. Healthcare and finance sectors are heavily impacted. Organizations must act quickly to patch vulnerabilities and secure their systems.

What Happened

Storm-1175, a financially motivated cybercriminal group, has been conducting high-velocity ransomware campaigns that exploit recently disclosed vulnerabilities. Their operations focus on vulnerable web-facing assets, allowing them to gain initial access, exfiltrate data, and deploy Medusa ransomware in record time.

How It Works

The group takes advantage of N-day vulnerabilities, which are flaws disclosed but not yet patched by organizations. Storm-1175 has been observed exploiting over 16 vulnerabilities since 2023, including notable ones like CVE-2023-21529 (Microsoft Exchange) and CVE-2025-10035 (GoAnywhere MFT). They can move from initial access to data exfiltration and ransomware deployment in as little as 24 hours.

Who's Being Targeted

Recent attacks have heavily impacted sectors such as healthcare, finance, and education across regions including the United States, United Kingdom, and Australia. The rapid pace of their operations has made them a significant threat to organizations that fail to adopt timely patches.

Signs of Infection

Indicators of a Storm-1175 attack may include:

  • Unusual account creations or modifications in user privileges.
  • Unexpected changes in antivirus settings or exclusions.
  • Rapid deployment of remote monitoring tools or unauthorized software.

How to Protect Yourself

Organizations can mitigate the risks associated with Storm-1175 by:

  • Regularly updating and patching systems to close vulnerabilities.
  • Monitoring for unusual account activity and credential theft.
  • Implementing strong access controls and limiting local administrative privileges.
  • Utilizing tools like Microsoft Defender for Endpoint to detect lateral movement and unauthorized access attempts.

Technical Details

Storm-1175 has demonstrated a capability to quickly rotate exploits, often leveraging zero-day vulnerabilities. They have also been seen chaining multiple exploits to enhance their post-compromise activities. For instance, they exploited vulnerabilities in Microsoft Exchange to gain initial access, followed by executing remote code to deepen their foothold.

Defensive Measures

To defend against such rapid and sophisticated attacks, organizations should:

  • Conduct regular security assessments and vulnerability scans.
  • Educate staff on recognizing phishing attempts and suspicious activity.
  • Implement a robust incident response plan to quickly address potential breaches.

Understanding the tactics employed by Storm-1175 is crucial for organizations to bolster their defenses against ransomware and similar cyber threats.

Pro Insight

🔒 Pro insight: Storm-1175's rapid exploitation of N-day vulnerabilities highlights the need for proactive patch management and continuous monitoring of web-facing assets.

Sources

Original Report

MSMicrosoft Security Blog· Microsoft Threat Intelligence
Read Original

Related Pings

HIGHMalware & Ransomware

Trojanized PyPI AI Proxy Steals User Data Silently

A malicious Python package named hermes-px has been found on PyPI, masquerading as a privacy-focused AI tool. Developers are unknowingly at risk of data breaches, as the package exfiltrates sensitive information. Immediate action is required to mitigate potential damage.

Cyber Security News·
HIGHMalware & Ransomware

Malicious Strapi NPM Packages Target Guardarian Users

Hackers have targeted Strapi users with 36 malicious NPM packages. This attack aims to steal credentials and execute unauthorized commands. Guardarian users are especially at risk, prompting urgent security measures.

SecurityWeek·
HIGHMalware & Ransomware

ILSpy Domain Compromised - Malware Delivered to Developers

Hackers compromised the ILSpy WordPress domain, redirecting users to a malicious site. Developers are at risk of malware disguised as a browser extension. Stay vigilant and verify downloads!

Cyber Security News·
HIGHMalware & Ransomware

Malware Newsletter Round 91 - Latest Threats and Insights

The latest malware newsletter reveals new threats like Infiniti Stealer and npm supply chain attacks. Developers and organizations must stay alert to evolving risks in cybersecurity.

Security Affairs·
HIGHMalware & Ransomware

Malicious Email Delivers CMD Malware - Privilege Escalation Alert

A malicious email has delivered a .cmd malware file that escalates privileges and bypasses antivirus systems. Users are at risk of significant system compromise. Awareness and immediate action are vital to mitigate this threat.

Security Affairs·
HIGHMalware & Ransomware

Axios NPM Package Compromised - Supply Chain Attack Exposed

A major supply chain attack compromised the Axios NPM package, affecting millions of users. Malicious versions deployed a RAT, posing serious security risks. Swift action was taken to remove the threats.

Trend Micro Research·