Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Android Developer Verification Rollout Begins Ahead of September Enforcement

April 9, 2026

Critical Vulnerability in Ninja Forms Exposes WordPress Sites

April 9, 2026

TrueConf Zero-Day Exploited in Attacks on Southeast Asian Government Networks

April 9, 2026
Facebook X (Twitter) Instagram
Thursday, April 9
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Storm-1175 Exploits Flaws in High-Velocity Medusa Attacks
News

Storm-1175 Exploits Flaws in High-Velocity Medusa Attacks

Team-CWDBy Team-CWDApril 7, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


A prolific cybercrime group has been weaponizing n-day and zero-day exploits in high-tempo Medusa ransomware attacks over the past three years, Microsoft has revealed.

Storm-1175 is a financially motivated actor that usually exploits the window between vulnerability disclosure and patch adoption, Microsoft said in a blog post on April 6.

“The threat actor’s high operational tempo and proficiency in identifying exposed perimeter assets have proven successful, with recent intrusions heavily impacting healthcare organizations, as well as those in the education, professional services, and finance sectors in Australia, the UK and US,” it said.

The group has exploited at least 16 vulnerabilities in this way since 2023, including three zero-day flaws such as CVE-2025-10035. That vulnerability in GoAnywhere Managed File Transfer, was exploited one week before public disclosure last year.

Read more on Storm-1175: Microsoft: Critical GoAnywhere Bug Exploited in Medusa Ransomware Campaign

Microsoft pointed to several typical TTPs used by Storm-1175:

  • The group creates a web shell or drops a remote access payload to establish an initial foothold – moving from initial access to ransomware deployment in one to six days
  • It establishes persistence by creating a new user and adding that user to the administrator’s group
  • It rotates various tools for reconnaissance and lateral movement, including living-off-the-land binaries (LOLBins), such as PowerShell and PsExec, followed by Cloudflare tunnels to move laterally over Remote Desktop Protocol (RDP) and deliver payloads to new devices
  • It uses multiple remote monitoring and management (RMM) tools during post-compromise activity such as creating new user accounts, enabling alternative command-and-control (C2) methods, delivering additional payloads, or using as interactive remote desktop sessions
  • Legitimate software deployment tool PDQ Deployer is sometimes used to silently install applications for lateral movement and payload delivery
  • Python-based tool Impacket is sometimes used for lateral movement and credential dumping
  • The group occasionally modifies Microsoft Defender Antivirus settings stored in the registry to prevent it blocking ransomware payloads

How to Tackle Storm-1175

Microsoft said the group has already exploited vulnerabilities in Exchange, Papercut, Ivanti Connect Secure and Policy Secure, ConnectWise ScreenConnect, JetBrains TeamCity, SimpleHelp, CrushFTP, GoAnywhere MFT, SmarterMail and BeyondTrust.

To mitigate the threat of attack, organizations should first use perimeter scanning tools to understand the extent of their attack surface, Microsoft recommended. Web-facing systems should be isolated from the public internet with a secure network boundary and accessed only via a virtual private network (VPN). 

If they must be connected, organizations should place these systems behind a web application firewall (WAF), reverse proxy, or perimeter network (aka DMZ), the report continued.

Microsoft also recommended:

  • Following its ransomware guidance on credential hygiene and limiting lateral movement
  • Implementing Credential Guard to protect credentials stored in process memory
  • Turning on tamper protection to prevent attackers from stopping security services or using antivirus exclusions
  • Removing unapproved RMM installations and adding multi-factor authentication (MFA) to approved ones
  • Configuring XDR tools to prevent common attack techniques used in ransomware attacks



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleRussian CTRL Toolkit Delivered via Malicious LNK Files Hijacks RDP via FRP Tunnels
Next Article 3 SOC Process Fixes That Unlock Tier 1 Productivity
Team-CWD
  • Website

Related Posts

News

Android Developer Verification Rollout Begins Ahead of September Enforcement

April 9, 2026
News

Critical Vulnerability in Ninja Forms Exposes WordPress Sites

April 9, 2026
News

TrueConf Zero-Day Exploited in Attacks on Southeast Asian Government Networks

April 9, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

Why SOC Burnout Can Be Avoided: Practical Steps

November 14, 20259 Views

Cyber M&A Roundup: Cyber Giants Strengthen AI Security Offerings

December 1, 20258 Views

Why the Identity Security Fabric is Essential for Securing AI and Non-Human Identities

November 27, 20258 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

Why SOC Burnout Can Be Avoided: Practical Steps

November 14, 20259 Views
Our Picks

In memoriam: David Harley

November 12, 2025

Children and chatbots: What parents should know

January 23, 2026

Why you should never pay to get paid

September 15, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.