Storm-1175 Medusa Ransomware Exploits

Over three years, Storm-1175 exploited 16 vulnerabilities—including three zero-days—to unleash Medusa ransomware at breakneck speed. Healthcare orgs are bleeding, but who's cashing in?

Storm-1175 Medusa ransomware attack timeline graphic showing exploits and targets

Key Takeaways

  • Storm-1175 exploited 16 vulns (3 zero-days) for Medusa ransomware since 2023, targeting healthcare and finance.
  • TTPs include rapid footholds, LOLBins, RMM abuse, and Defender evasion—patch gaps aggressively.
  • Mitigate with perimeter isolation, credential hygiene, and proactive hunting; they're profit-driven pros.

16 vulnerabilities. That’s how many Storm-1175 has ripped open since 2023, turning them into launchpads for their high-velocity Medusa ransomware attacks.

And yeah, Microsoft dropped this bomb in a blog post last week—three of ‘em zero-days, like CVE-2025-10035 in GoAnywhere, hit a full week before anyone knew it existed. I’ve been chasing cyber crooks since the early days of Code Red, and this? This smells like the same old playbook, just turbocharged.

Storm-1175: The Payroll Predators

These guys aren’t your basement script kiddies. Financially motivated, they’re pros at sniffing out the gap between vuln disclosure and your IT team’s frantic patching. Hit healthcare hard lately—schools, pros, finance too, across Australia, UK, US.

Here’s Microsoft on their tempo:

“The threat actor’s high operational tempo and proficiency in identifying exposed perimeter assets have proven successful, with recent intrusions heavily impacting healthcare organizations, as well as those in the education, professional services, and finance sectors in Australia, the UK and US.”

Spot on. But let’s cut the corporate polish: they’re making bank because you’re leaving doors wide open.

Foothold in one to six days. That’s their sweet spot—from exploit to ransomware drop. Web shell here, remote payload there. Then persistence: new admin user, boom.

They mix LOLBins like PowerShell and PsExec with Cloudflare tunnels over RDP. Sneaky. Throw in RMM tools for C2, PDQ Deployer for silent installs, Impacket for creds. Hell, they even tweak Defender registry to let payloads slide.

One short paragraph. Brutal efficiency.

Why Your Perimeter’s a Sitting Duck

Look, I’ve seen this movie. Remember Conti? Same rush, same exploits in Exchange, PrintNightmare—now it’s Papercut, Ivanti, ConnectWise, JetBrains, the list drags on: CrushFTP, GoAnywhere, SmarterMail, BeyondTrust.

Storm-1175’s not inventing the wheel; they’re just spinning it faster. And Microsoft’s late to the party again—blogging after years of this crap. Who’s paying whom here? Defender sales spike post-breach?

But here’s my unique take, something Microsoft glosses over: this mirrors the WannaCry blueprint from 2017, but with ransomware-as-a-service polish. Back then, nation-states dipped in; now it’s pure profit pirates. Prediction? By 2026, Medusa variants will auto-exploit via AI scouts—your EDR won’t blink.

Organizations, wake up. Perimeter scans first—map that attack surface. Isolate web-facing junk behind VPNs, WAFs, DMZs. Credential hygiene? Duh. Credential Guard on. Tamper protection—don’t let ‘em kill your AV.

Rip out rogue RMMs, MFA the good ones. XDR to block the TTPs. Microsoft’s checklist is solid, but cynical me says: follow it, or fund these hackers’ Lambos.

And yeah, they’ve tuned this for speed. No dawdling.

A fragmented thought: speed kills—your defenses.

Then this sprawler: rotating tools means no single sig catches ‘em, Cloudflare masks the C2 like a pro VPN service (ironic, right?), and that Defender tweak? It’s low-hanging fruit because too many admins skimp on least-privilege.

Medium one. Patch faster, folks.

So, who profits? Storm-1175 cashes ransomware checks. Microsoft sells more security. You? Breach headlines.

Is Storm-1175 Unstoppable?

Nah. But close. Their high-tempo game’s built on your slowness—n-day windows you ignore. Zero-days? Pray.

I’ve covered Valley hype for 20 years; cyber’s no different. Buzzword salads like ‘operational tempo’ hide the truth: basic opsec fails.

(Aside: Medusa’s not new—evolved from Conti forks, but faster payouts lure affiliates.)

Mitigate? Microsoft’s right—network boundaries, no public web apps. But add my spin: audit RMMs monthly; they’re backdoors begging use.

One punch: Hunt them proactively.

Dense dive: PowerShell abuse? Log it, anomaly-detect. Impacket? Network segmentation kills lateral hops. PDQ Deployer—legit tool turned evil; block unless whitelisted. And those Cloudflare tunnels? DPI your outbound.

They’re in education too—think underfunded IT. Finance? High stakes. Healthcare? Lives, man.

But here’s the kicker—unique insight: unlike pure ransomware crews, Storm-1175 blends RaaS with custom exploits, echoing LockBit’s model but leaner. PR spin from Microsoft positions them as saviors; reality? Their telemetry feeds this intel years late.

Why Does Storm-1175 Target Healthcare Now?

Easy marks. Legacy systems, tight budgets, ransomware pays double ‘cause HIPAA fines loom.

Australia, UK, US—global, but English-speaking perimeters weakest? Nah, just juicy targets.

Cynical? Absolutely. Who’s making money? Affiliates splitting Medusa cuts—20-30% typical. Victims pay to end pain.

Follow Microsoft’s ransomware guide: limit laterals, hygiene creds. Turn on tamper protection—attackers hate it.

Wander a bit: I recall 2016’s Hollywood Presbyterian—$17k Bitcoin. Now? Millions. Scale up.

Land here: Patch velocity must match theirs, or you’re toast.

**


🧬 Related Insights

Frequently Asked Questions**

What is Storm-1175?

Prolific cybercrime group pushing Medusa ransomware via n-day and zero-day exploits, hitting perimeters hard since 2023.

How does Storm-1175 deploy ransomware?

Initial foothold via vulns, then web shells, persistence with admin users, lateral via LOLBins/RMM/Impacket, Defender tweaks, payload drop in 1-6 days.

How to protect against Storm-1175 attacks?

Scan perimeters, isolate web apps, VPN/DMZ/WAF, Credential Guard, tamper protection, audit RMMs with MFA, XDR for TTPs.

Aisha Patel
Written by

Former ML engineer turned writer. Covers computer vision and robotics with a practitioner perspective.

Frequently asked questions

What is Storm-1175?
Prolific cybercrime group pushing Medusa ransomware via n-day and <a href="/tag/zero-day-exploits/">zero-day exploits</a>, hitting perimeters hard since 2023.
How does Storm-1175 deploy ransomware?
Initial foothold via vulns, then web shells, persistence with admin users, lateral via LOLBins/RMM/Impacket, Defender tweaks, payload drop in 1-6 days.
How to protect against Storm-1175 attacks?
Scan perimeters, isolate web apps, VPN/DMZ/WAF, Credential Guard, tamper protection, audit RMMs with MFA, XDR for TTPs.

Worth sharing?

Get the best AI stories of the week in your inbox — no noise, no spam.

Originally reported by InfoSecurity Magazine

Stay in the loop

The week's most important stories from theAIcatchup, delivered once a week.