Storm-1175 Ransomware Targets Web Assets Fast

Over 16 vulnerabilities exploited since 2023 — that's Storm-1175's tally in their high-speed Medusa ransomware rampage. Healthcare orgs are dropping like flies, and your web-facing servers might be next.

Storm-1175's Blitz: 16 Vulns Weaponized in Ransomware Sprint — theAIcatchup

Key Takeaways

  • Storm-1175 exploits 16+ vulns since 2023, often in under 24 hours post-disclosure.
  • Targets healthcare hardest; chains exploits for rapid ransomware deployment.
  • Patch web assets now — or pay the Medusa price.

Sixteen vulnerabilities. That’s how many Storm-1175 has weaponized since 2023, turning your shiny web-facing assets into ransomware piñatas before you even blink.

Look, I’ve been chasing these cyber goons for two decades now, from the early WannaCry chaos to today’s polished ransomware factories. And Storm-1175? They’re not your grandma’s script kiddies. These folks — tracked by Microsoft — hit fast, exfiltrate data in days, sometimes hours, then slam down Medusa ransomware. Healthcare’s taking the brunt lately, but education, finance, pro services in the US, UK, Australia? All in the crosshairs.

Why Do They Move This Damn Fast?

It’s the N-days, folks. Those sweet spots between disclosure and your IT patching. Storm-1175 sniffs ‘em out, codes exploits overnight — like that SAP NetWeaver CVE-2025-31324, disclosed April 24, exploited April 25. Boom. One day.

They chain ‘em too. Remember July 2023? Two Exchange bugs — CVE-2022-41080 for access, CVE-2022-41082 for RCE. OWASSRF, the researchers called it. Storm-1175 didn’t hesitate.

And zero-days? Yeah, they’ve got three on the board, including SmarterMail’s CVE-2026-23760 a week before anyone knew. GoAnywhere MFT too. Not bad for a crew that mostly rides N-day waves. But here’s my take — they’re tapping exploit brokers now, or maybe poached talent from Conti remnants. (Remember Conti’s glory days? Same playbook, faster tempo.)

“Storm-1175 rapidly weaponizes recently disclosed vulnerabilities to obtain initial access. Since 2023, Microsoft Threat Intelligence has observed exploitation of over 16 vulnerabilities.”

That’s Microsoft laying it out cold. No spin.

Post-access? Persistence via new user accounts. RMM tools for hopping networks. Credential dumps. Security tampering. Then ransomware everywhere. Linux? They hit Oracle WebLogic too, late 2024.

Ivanti, ConnectWise, JetBrains, Papercut, SimpleHelp, CrushFTP, SmarterMail, BeyondTrust — the list reads like a who’s who of unpatched shame. Who’s buying these patches? Not enough of you, apparently.

Who’s Actually Cashing In Here?

Not the victims. Storm-1175’s printing money — Medusa payouts rolling in while hospitals scramble. Healthcare’s a goldmine: slow patches, high stakes, desperate payers. Finance next? Bet on it.

But my unique angle — this ain’t evolution, it’s commoditization. Back in 2010s, ransomware was bespoke. Now? Exploit-as-a-service. Storm-1175’s tempo screams dark web marketplaces handing ‘em ready exploits. Prediction: By 2026, we’ll see 50% more zero-days from these tempo-junkies, unless vendors ship patches same-day. (Fat chance.)

Vendors spin ‘critical fixes imminent!’ Yeah, right. Storm-1175 laughs, exploits drop in hours. Your perimeter’s the weak link — web apps screaming for attention.

Short para: Patch faster.

Or don’t. And pay up.

Can Your Team Beat This Speed Demon?

Doubt it, if you’re average. They create accounts, steal creds, neuter EDR — all before coffee break.

Defenses? Hunt for anomalies: new accounts on day one? RMM spikes? Exfil bursts? Disrupt there.

Microsoft’s right — even post-access, you can kneecap ‘em. But who invests? CISOs squeezed by budgets, chasing AI hype instead.

Real talk: Segment networks. Zero trust, for once. Inventory web assets — I bet half your org doesn’t even know ‘em.

And that CrushFTP zero-day? CVE-2025-31161. Or GoAnywhere’s repeat offender status. History repeats because we forget.

The Sectors Bleeding Cash

Healthcare leads the pack — intrusions “heavily impacting” them, says Microsoft. Why? Legacy systems, underfunded IT. Education? Soft targets. Finance? High ransoms.

Australia, UK, US — geography don’t matter. Exposed assets do.

I’ve seen this movie: NotPetya wrecked Ukraine, spilled global. Storm-1175’s smaller, but tempo scales. One hospital down? Chains to suppliers.

Cynical? Sure. But true — money flows to attackers till boards wake up.


🧬 Related Insights

Frequently Asked Questions

What is Storm-1175?

Financial cybercrew wielding Medusa ransomware, famous for lightning-fast N-day and zero-day exploits on web assets.

How does Storm-1175 get in?

Via unpatched vulns like Ivanti, ConnectWise, JetBrains — often chaining two for full control.

How to stop Storm-1175 ransomware?

Patch daily, hunt web exposures, monitor for new accounts and exfil. Assume breach.

Elena Vasquez
Written by

Senior editor and generalist covering the biggest stories with a sharp, skeptical eye.

Frequently asked questions

What is Storm-1175?
Financial cybercrew wielding Medusa ransomware, famous for lightning-fast N-day and zero-day exploits on web assets.
How does Storm-1175 get in?
Via unpatched vulns like Ivanti, ConnectWise, JetBrains — often chaining two for full control.
How to stop Storm-1175 ransomware?
Patch daily, hunt web exposures, monitor for new accounts and exfil. Assume breach.

Worth sharing?

Get the best AI stories of the week in your inbox — no noise, no spam.

Originally reported by Microsoft Security Blog

Stay in the loop

The week's most important stories from theAIcatchup, delivered once a week.