Storm-1175 ransomware operations leveraging n-day and zero-day exploits in Medusa campaigns
Summary
Hide ▲
Show ▼
Storm-1175, a financially motivated cybercrime group, has conducted high-tempo Medusa ransomware attacks over the past three years by exploiting both n-day and zero-day vulnerabilities during the patch gap between disclosure and remediation. The actor primarily targets exposed perimeter assets, achieving initial access via web shells or remote access payloads and deploying ransomware within one to six days. Victims include healthcare, education, professional services, and finance sectors across Australia, the UK, and the US. Since 2023, Storm-1175 has weaponized at least 16 vulnerabilities, including the zero-day CVE-2025-10035 in GoAnywhere Managed File Transfer, exploited one week prior to public disclosure.
Timeline
-
07.04.2026 13:02 1 articles · 10h ago
Storm-1175 ransomware campaign exploiting n-day and zero-day vulnerabilities in Medusa attacks
Microsoft reports that Storm-1175 has conducted high-tempo Medusa ransomware attacks since 2023 by weaponizing vulnerabilities during the patch gap period. The actor exploits exposed perimeter assets, establishes initial access via web shells or remote access payloads, and deploys ransomware within 1–6 days. At least 16 vulnerabilities have been exploited, including the zero-day CVE-2025-10035 in GoAnywhere Managed File Transfer, exploited one week prior to public disclosure. Targeted sectors include healthcare, education, professional services, and finance across Australia, the UK, and the US.
Show sources
- Storm-1175 Exploits Flaws in High-Velocity Medusa Attacks — www.infosecurity-magazine.com — 07.04.2026 13:02
Information Snippets
-
Storm-1175 is a financially motivated cybercrime group conducting Medusa ransomware attacks with high operational tempo, exploiting vulnerabilities during the patch gap period.
First reported: 07.04.2026 13:021 source, 1 articleShow sources
- Storm-1175 Exploits Flaws in High-Velocity Medusa Attacks — www.infosecurity-magazine.com — 07.04.2026 13:02
-
The group has exploited at least 16 vulnerabilities since 2023, including three zero-days such as CVE-2025-10035 in GoAnywhere Managed File Transfer, exploited one week before public disclosure.
First reported: 07.04.2026 13:021 source, 1 articleShow sources
- Storm-1175 Exploits Flaws in High-Velocity Medusa Attacks — www.infosecurity-magazine.com — 07.04.2026 13:02
-
Storm-1175 targets exposed perimeter assets, establishing initial access via web shells or remote access payloads and deploying ransomware within 1–6 days.
First reported: 07.04.2026 13:021 source, 1 articleShow sources
- Storm-1175 Exploits Flaws in High-Velocity Medusa Attacks — www.infosecurity-magazine.com — 07.04.2026 13:02
-
Affected sectors include healthcare, education, professional services, and finance in Australia, the UK, and the US.
First reported: 07.04.2026 13:021 source, 1 articleShow sources
- Storm-1175 Exploits Flaws in High-Velocity Medusa Attacks — www.infosecurity-magazine.com — 07.04.2026 13:02
-
TTPs include creating web shells, dropping remote access payloads, establishing persistence via new admin accounts, and using LOLBins (PowerShell, PsExec), Cloudflare tunnels, Impacket, and PDQ Deployer for lateral movement and payload delivery.
First reported: 07.04.2026 13:021 source, 1 articleShow sources
- Storm-1175 Exploits Flaws in High-Velocity Medusa Attacks — www.infosecurity-magazine.com — 07.04.2026 13:02
-
The group has exploited vulnerabilities in Exchange, PaperCut, Ivanti Connect Secure and Policy Secure, ConnectWise ScreenConnect, JetBrains TeamCity, SimpleHelp, CrushFTP, GoAnywhere MFT, SmarterMail, and BeyondTrust.
First reported: 07.04.2026 13:021 source, 1 articleShow sources
- Storm-1175 Exploits Flaws in High-Velocity Medusa Attacks — www.infosecurity-magazine.com — 07.04.2026 13:02