You are currently viewing Storm-1175 and Medusa Ransomware: Anatomy of a Rapid Multi-Exploit Intrusion

Storm-1175 and Medusa Ransomware: Anatomy of a Rapid Multi-Exploit Intrusion

  • Post author:
  • Reading time:4 mins read

Threat actors are increasingly moving faster than ever in ransomware operations, shrinking the time between initial compromise and ransomware deployment to maximize impact before defenders can respond. Instead of relying on prolonged persistence, modern ransomware groups are rapidly exploiting newly disclosed vulnerabilities and automating post-compromise actions to accelerate attacks.

According to recent findings from Microsoft Threat Intelligence, the threat actor Storm-1175 has been observed conducting high-speed ransomware campaigns by exploiting newly disclosed vulnerabilities and deploying Medusa ransomware shortly after gaining access. The group has demonstrated the ability to move from initial compromise to ransomware deployment in less than 24 hours in some incidents.


Background on Storm-1175 Operations

Storm-1175 is a financially motivated threat actor known for exploiting internet-facing systems to gain initial access and rapidly deploying ransomware. Microsoft has tracked the group targeting organizations across multiple sectors using aggressive exploitation tactics and fast operational execution.

Storm-1175 operations commonly involve:

  • Exploiting vulnerable public-facing applications
  • Quickly weaponizing newly disclosed vulnerabilities
  • Conducting rapid lateral movement after compromise
  • Harvesting credentials and escalating privileges
  • Deploying ransomware with minimal dwell time

Microsoft notes that the group’s speed and adaptability make it a significant threat to organizations with exposed or unpatched perimeter systems.


Timeline and Scope

  • Threat Actor Activity Tracked Since: 2023
  • Ransomware Family Used: Medusa
  • Time to Ransomware Deployment: As little as 24 hours
  • Targeting Regions: Primarily United States, United Kingdom, and Australia

Infection Method

Storm-1175 gains initial access by exploiting vulnerable internet-facing applications and services. Microsoft observed the group targeting organizations with exposed systems that had not yet been patched against recently disclosed vulnerabilities.

Storm-1175 Attack Chain

The attackers use tools such as PowerShell, PsExec, and PDQ Deploy to move across the network and weaken defenses by modifying security settings and disabling protections. Once defenses are reduced, Medusa ransomware is deployed across compromised systems.


Exploited Vulnerabilities Observed

Microsoft observed Storm-1175 exploiting vulnerabilities across several enterprise platforms, including flaws in:

CVE ID Affected productCVSS EPSS
CVE-2026-1731 – OS Command Injection allowing unauthenticated RCEBeyondTrust 9.8 (Critical)80.06 %
CVE-2023-21529 – Deserialization of untrusted data leading to RCEMicrosoft Exchange 8.8 (High)35.02%
CVE-2023-27350 – Authentication bypass leading to remote code executionPaperCut9.8 (Critical)94.26%
CVE-2023-27351 – Authentication bypass vulnerabilityPaperCut9.8 (Critical)44.63%
CVE-2023-46805 – Authentication bypass in web componentIvanti Connect Secure / Policy Secure8.2 (High)94.37%
CVE-2024-21887 – Command injection vulnerabilityIvanti Connect Secure / Policy Secure9.1 (Critical)94.41%
CVE-2024-1709 – Authentication bypass using alternate pathConnectWise ScreenConnect10.0 (Critical)94.32%
CVE-2024-1708 – Path traversal vulnerabilityConnectWise ScreenConnect8.4 (High)52.12%
CVE-2024-27198 – Authentication bypass allowing admin actions / RCEJetBrains TeamCity9.8 (Critical)93.05%
CVE-2024-27199– Path traversal authentication bypassJetBrains TeamCity7.3 (High)82.47%
CVE-2024-57726 – Privilege escalation via excessive API permissionsSimpleHelp9.9 (Critical)0.30%
CVE-2024-57727 – Unauthenticated file download (path traversal)SimpleHelp 9.1 (Critical)94.02%
CVE-2024-57728 – Arbitrary file upload leading to RCESimpleHelp 9.8 (Critical)1.03%
CVE-2025-31161 – Authentication bypass and admin account takeoverCrushFTP9.8 (Critical)86.21%
CVE-2025-10035 – Deserialization of untrusted data leading to RCEGoAnywhere MFT10.0 (Critical)54.64%
CVE-2025-52691 – Unrestricted file upload with dangerous typeSmarterMail10.0 (Critical)87.29%
CVE-2026-23760 – Authentication bypass via alternate pathSmarterMail9.3 (Critical)79.94%

Indicators of Compromise (IOCs)

  • Creation of new local or domain user accounts, followed by addition to the Administrators group.
  • Credential dumping from LSASS, using tools such as Impacket and Mimikatz.
  • Deployment of web shells or remote access payloads on web facing servers.

MITRE ATT&CK Mapping

  • TA0001 – Initial Access: Exploit Public-Facing Application
  • TA0002 – Execution: Command and Scripting Interpreter
  • TA0003 – Persistence: Create Account / Web Shell
  • TA0006 – Credential Access: OS Credential Dumping
  • TA0005 – Defense Evasion: Impair Defenses
  • TA0008 – Lateral Movement: Remote Services
  • TA0040 – Impact: Data Encrypted for Impact

Mitigation

  • Patch internet-facing systems immediately after vulnerability disclosure
  • Prioritize remediation of exposed perimeter services
  • Monitor for suspicious administrative tool usage
  • Audit creation of new privileged accounts
  • Restrict unnecessary remote management tools
  • Enable multi-factor authentication for privileged accounts
  • Continuously monitor for credential dumping activity

Instantly Fix Risks with Saner Patch Management

Saner patch management is a continuous, automated, and integrated software that instantly fixes risks exploited in the wild. The software supports major operating systems like Windows, Linux, and macOS, as well as 550+ third-party applications.

It also allows you to set up a safe testing area to test patches before deploying them in a primary production environment. Saner patch management additionally supports a patch rollback feature in case of patch failure or a system malfunction.

Experience the fastest and most accurate patching software here.