Storm-1175 Medusa Ransomware Zero-Day Attacks

Your local hospital's servers go dark. Patients wait in limbo. That's the grim reality of Storm-1175's zero-day ransomware rampage — and it's just getting started.

Digital illustration of Storm-1175 ransomware chain exploiting zero-day vulnerabilities in hospital network

Key Takeaways

  • Storm-1175 exploits zero-days pre-patch, chaining them for rapid ransomware deployment.
  • Healthcare, education, finance sectors hit hardest; real-world disruptions imminent.
  • Patch aggressively — this gang's high tempo demands proactive defense, not reactive fixes.

Imagine this: you’re in the ER, bleeding, but the docs can’t pull up your records. Lights flicker — not from a storm, but from Storm-1175.

China’s slick cybercrooks, armed with Medusa ransomware, are blasting through zero-days like kids smashing piñatas. Real people suffer first. Hospitals grind to a halt. Schools close. Banks freeze your paycheck. And Microsoft’s latest intel? It’s a wake-up slap we should’ve felt years ago.

Here’s the thing — these aren’t your garden-variety script kiddies. Storm-1175 spots a flaw, crafts an exploit in days (sometimes hours), then chains it with credential theft and backdoor installs. Boom. Ransomware drops. Data exfiltrated. You’re locked out.

“Storm-1175 rapidly moves from initial access to data exfiltration and deployment of Medusa ransomware, often within a few days and, in some cases, within 24 hours,” Microsoft said.

Punchy, right? That’s their tempo. High-velocity hell.

Why Hospitals Are Storm-1175’s Favorite Target?

Healthcare? Sitting ducks. Why? Legacy systems, rushed patches, underfunded IT. Storm-1175’s hit ‘em hard in the US, UK, Australia. Education, finance too — but nothing says ‘chaos’ like a ransomware-crippled OR.

Think about it. One zero-day in GoAnywhere MFT (CVE-2025-10035), exploited a full week pre-patch. Another in SmarterMail (CVE-2026-23760), pure auth bypass. They’re not waiting for vendors. They’re buying from brokers or building in-house. Evolved, Microsoft calls it. I’d say predatory.

And the chain? Nasty. New user accounts. RMM tools sneaked in. Security software nuked. Then Medusa. Over 16 vulns across 10 products — Exchange, Papercut, Ivanti, ConnectWise, JetBrains, you name it. It’s a buffet.

Short version: if your perimeter’s exposed, you’re toast.

But wait — corporate spin alert. Microsoft notes GoAnywhere and SmarterMail had prior flaws. Like that excuses zero-days. Nah. This gang’s tempo screams state-adjacent resources (China-based, remember?). Not your lone wolf.

Is Patching Even Keeping Up with Storm-1175?

Nope.

They weaponize n-days in a day. Zero-days? Weeks ahead of patches. CISA’s March advisory screamed it: 300+ US critical infra orgs hit by Medusa. FBI, MS-ISAC piled on. July ‘24? Linked to Black Basta, Akira via VMware flaws.

Patching’s a joke in most shops. Vendors lag. Admins overwhelmed. Storm-1175 exploits that gap — surgically.

My hot take? This mirrors the 2017 WannaCry blueprint, but faster, smarter. North Korea wrecked hospitals then; China’s crew does it for profit now. Prediction: by 2026, Medusa variants hit 1,000 orgs yearly unless we mandate real-time vuln scanning. No more ‘we’ll patch Tuesday’ excuses.

Look, I’ve covered ransomware since CryptoLocker. This feels different. Financially motivated, sure — but the zero-day access? Smells like an exploit bazaar with Beijing backers. Microsoft’s polite; I’m not. Wake up, CISOs.

Sectors hammered: healthcare (obvious pain), pro services, finance, education. Australia, UK, US. Your org’s next if it’s running CrushFTP, SimpleHelp, BeyondTrust, or any of that laundry list.

Dry humor break: at least they’re equal-opportunity extortionists. No favorites — just fat ransoms.

Storm-1175’s Playbook: From Zero-Day to Payday

Step one: scan perimeters. Find the hole.

Step two: exploit. Chain if needed — like Ivanti’s duo (CVE-2023-46805, CVE-2024-21887).

Step three: persist. Steal creds, drop RMM, kill EDR.

Step four: exfil, encrypt, demand Bitcoin.

Proficiency? Undeniable. Recent campaigns: JetBrains TeamCity doubles (CVE-2024-27198/27199), SmarterMail again (CVE-2025-52691). They’re recycling, iterating.

Microsoft’s tracking since October. Good on ‘em. But here’s the rub — while Big Tech flags it, SMBs drown. No SOC, no budget. Real people — nurses, teachers, accountants — foot the bill.

Unique angle: this ain’t evolution; it’s commoditization. Zero-days as a service. Brokers feed Storm-1175 like DoorDash. Parallels the dark web’s LockBit empire — but with Eastern efficiency. LockBit boasted; these guys just execute.

What Now? Real Talk for the Trenches

Patch aggressively. Segment networks. Hunt exposed assets. Microsoft’s got IOCs — use ‘em.

Hunt for RMM anomalies. Monitor for new accounts. And for god’s sake, test backups offline.

Humor aside, this tempo terrifies. 24-hour ransomware? That’s not crime; that’s warfare on wallets.

Governments? Step up. CISA’s advisory was March ‘25 — six months later, still raging. Ban payments? Fine. But arm the victims first.

Final jab: vendors, own your crap. Zero-week exploits thrive on your delays.


🧬 Related Insights

Frequently Asked Questions

What is Storm-1175 and Medusa ransomware?

Storm-1175 is a China-linked cybercrime group deploying Medusa ransomware via zero- and n-day exploits. They hit fast: access to encryption in hours or days.

Which vulnerabilities has Storm-1175 exploited?

Over 16 across 10 products: GoAnywhere (CVE-2025-10035), SmarterMail (CVE-2026-23760), Microsoft Exchange, Papercut, Ivanti, ConnectWise, JetBrains TeamCity, and more.

How to protect against Medusa ransomware attacks?

Patch immediately, scan perimeters, monitor for persistence (new accounts, RMM), segment networks, and test offline backups. Microsoft’s threat intel has full IOCs.

James Kowalski
Written by

Investigative tech reporter focused on AI ethics, regulation, and societal impact.

Frequently asked questions

What is Storm-1175 and Medusa ransomware?
Storm-1175 is a China-linked cybercrime group deploying Medusa ransomware via zero- and n-day exploits. They hit fast: access to encryption in hours or days.
Which vulnerabilities has Storm-1175 exploited?
Over 16 across 10 products: GoAnywhere (CVE-2025-10035), SmarterMail (CVE-2026-23760), Microsoft Exchange, Papercut, Ivanti, ConnectWise, JetBrains TeamCity, and more.
How to protect against Medusa ransomware attacks?
Patch immediately, scan perimeters, monitor for persistence (new accounts, RMM), segment networks, and test offline backups. Microsoft's threat intel has full IOCs.

Worth sharing?

Get the best AI stories of the week in your inbox — no noise, no spam.

Originally reported by Bleeping Computer

Stay in the loop

The week's most important stories from theAIcatchup, delivered once a week.