{"id":386192,"date":"2026-04-07T10:54:07","date_gmt":"2026-04-07T10:54:07","guid":{"rendered":"https:\/\/www.newsbeep.com\/ie\/386192\/"},"modified":"2026-04-07T10:54:07","modified_gmt":"2026-04-07T10:54:07","slug":"storm-1175-exploits-flaws-in-high-velocity-medusa-attacks","status":"publish","type":"post","link":"https:\/\/www.newsbeep.com\/ie\/386192\/","title":{"rendered":"Storm-1175 Exploits Flaws in High-Velocity Medusa Attacks"},"content":{"rendered":"<p>A prolific cybercrime group has been weaponizing n-day and zero-day exploits in high-tempo Medusa ransomware attacks over the past three years, Microsoft has revealed.<\/p>\n<p>Storm-1175 is a financially motivated actor that usually exploits the window between vulnerability disclosure and patch adoption, Microsoft said in a blog post on April 6.<\/p>\n<p>\u201cThe threat actor\u2019s high operational tempo and proficiency in identifying exposed perimeter assets have proven successful, with recent intrusions heavily impacting healthcare organizations, as well as those in the education, professional services, and finance sectors in Australia, the UK and US,\u201d it said.<\/p>\n<p>The group has exploited at least 16 vulnerabilities in this way since 2023, including three zero-day flaws such as CVE-2025-10035. That vulnerability in GoAnywhere Managed File Transfer, was exploited one week before public disclosure last year.<\/p>\n<p><a href=\"https:\/\/nam11.safelinks.protection.outlook.com\/?url=https%3A%2F%2Fwww.infosecurity-magazine.com%2Fnews%2Fmicrosoft-critical-goanywhere%2F&amp;data=05%7C02%7Cbeth.maundrill%40rxglobal.com%7Cf155b0b1f7f6474c07ea08de948a0384%7C9274ee3f94254109a27f9fb15c10675d%7C0%7C0%7C639111517652474737%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=d0x3Uwq14x1%2FM1jucZ%2FI%2FZxNA3Bj150T3R0rHBSqL04%3D&amp;reserved=0\" rel=\"nofollow noopener\" target=\"_blank\">Read more on Storm-1175: Microsoft: Critical GoAnywhere Bug Exploited in Medusa Ransomware Campaign<\/a><\/p>\n<p>Microsoft pointed to several typical TTPs used by Storm-1175:<\/p>\n<p>\tThe group creates a web shell or drops a remote access payload to establish an initial foothold\u00a0\u2013 moving from initial access to ransomware deployment in one to six\u00a0days<br \/>\n\tIt establishes persistence by creating a new user and adding that user to the administrator\u2019s group<br \/>\n\tIt rotates various tools for reconnaissance and lateral movement, including living-off-the-land binaries (LOLBins), such as PowerShell and PsExec, followed by Cloudflare tunnels to move laterally over Remote Desktop Protocol (RDP) and deliver payloads to new devices<br \/>\n\tIt uses multiple remote monitoring and management (RMM) tools during post-compromise activity such as creating new user accounts, enabling alternative command-and-control (C2) methods, delivering additional payloads, or using as interactive remote desktop sessions<br \/>\n\tLegitimate software deployment tool PDQ Deployer is sometimes used to silently install applications for lateral movement and payload delivery<br \/>\n\tPython-based tool Impacket is sometimes used for lateral movement and credential dumping<br \/>\n\tThe group occasionally modifies Microsoft Defender Antivirus settings stored in the registry to prevent it blocking ransomware payloads<\/p>\n<p>How to Tackle Storm-1175<\/p>\n<p>Microsoft said the group has already exploited vulnerabilities in Exchange, Papercut, Ivanti Connect Secure and Policy Secure, ConnectWise ScreenConnect, JetBrains TeamCity, SimpleHelp, CrushFTP, GoAnywhere MFT, SmarterMail\u00a0and BeyondTrust.<\/p>\n<p>To mitigate the threat of attack, organizations should first use perimeter scanning tools to understand the extent of their attack surface, Microsoft recommended. Web-facing systems should be isolated from the public internet with a secure network boundary and accessed only via a virtual private network (VPN).\u00a0<\/p>\n<p>If they must be connected, organizations should place these systems behind a web application firewall (WAF), reverse proxy, or perimeter network (aka DMZ), the report continued.<\/p>\n<p>Microsoft also <a href=\"https:\/\/nam11.safelinks.protection.outlook.com\/?url=https%3A%2F%2Fwww.microsoft.com%2Fen-us%2Fsecurity%2Fblog%2F2026%2F04%2F06%2Fstorm-1175-focuses-gaze-on-vulnerable-web-facing-assets-in-high-tempo-medusa-ransomware-operations%2F&amp;data=05%7C02%7Cbeth.maundrill%40rxglobal.com%7Cf155b0b1f7f6474c07ea08de948a0384%7C9274ee3f94254109a27f9fb15c10675d%7C0%7C0%7C639111517652508131%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=FxI9Fe8ugEPcSwdwVAXPcVaYNA%2Ft3kNhaY3XtT8j8Ug%3D&amp;reserved=0\" rel=\"nofollow noopener\" target=\"_blank\">recommended<\/a>:<\/p>\n<p>\tFollowing its ransomware <a href=\"https:\/\/nam11.safelinks.protection.outlook.com\/?url=https%3A%2F%2Fwww.microsoft.com%2Fen-us%2Fsecurity%2Fblog%2F2022%2F05%2F09%2Fransomware-as-a-service-understanding-the-cybercrime-gig-economy-and-how-to-protect-yourself%2F%23defending-against-ransomware%3Focid%3Dmagicti_ta_blog&amp;data=05%7C02%7Cbeth.maundrill%40rxglobal.com%7Cf155b0b1f7f6474c07ea08de948a0384%7C9274ee3f94254109a27f9fb15c10675d%7C0%7C0%7C639111517652526836%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=Oza4gaLuCnt6sQ6SJBQn%2FS4brLhBNyAefAv8uEV1G6k%3D&amp;reserved=0\" rel=\"nofollow noopener\" target=\"_blank\">guidance <\/a>on credential hygiene and limiting lateral movement<br \/>\n\tImplementing Credential Guard to protect credentials stored in process memory<br \/>\n\tTurning on tamper protection to prevent attackers from stopping security services or using antivirus exclusions<br \/>\n\tRemoving unapproved RMM installations and adding multi-factor authentication (MFA) to approved ones<br \/>\n\tConfiguring XDR tools to prevent common attack techniques used in ransomware attacks<\/p>\n","protected":false},"excerpt":{"rendered":"A prolific cybercrime group has been weaponizing n-day and zero-day exploits in high-tempo Medusa ransomware attacks over the&hellip;\n","protected":false},"author":2,"featured_media":386193,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6],"tags":[61,60,80],"class_list":{"0":"post-386192","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-technology","8":"tag-ie","9":"tag-ireland","10":"tag-technology"},"_links":{"self":[{"href":"https:\/\/www.newsbeep.com\/ie\/wp-json\/wp\/v2\/posts\/386192","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.newsbeep.com\/ie\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.newsbeep.com\/ie\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.newsbeep.com\/ie\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.newsbeep.com\/ie\/wp-json\/wp\/v2\/comments?post=386192"}],"version-history":[{"count":0,"href":"https:\/\/www.newsbeep.com\/ie\/wp-json\/wp\/v2\/posts\/386192\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.newsbeep.com\/ie\/wp-json\/wp\/v2\/media\/386193"}],"wp:attachment":[{"href":"https:\/\/www.newsbeep.com\/ie\/wp-json\/wp\/v2\/media?parent=386192"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.newsbeep.com\/ie\/wp-json\/wp\/v2\/categories?post=386192"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.newsbeep.com\/ie\/wp-json\/wp\/v2\/tags?post=386192"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}