LIVE NEWS
  • Five AI Compute Architectures Every Engineer Should Know: CPUs, GPUs, TPUs, NPUs, and LPUs Compared
  • UK’s warm and dry April 1976 was a taste of scorching summer to come | Drought
  • UK PM Keir Starmer visits Gulf to shore up ‘fragile’ US-Iran ceasefire | US-Israel war on Iran
  • Today is your last chance to score the Samsung Galaxy Z TriFold, but it will sell out in minutes — here’s what you can do to boost your odds
  • Australia news live: Dutton given key board appointment by Queensland government; Victorian teachers to hold rolling half-day strikes | Australia news
  • With the World’s First $7M Leaderboard, Spartans Changes the Best Online Casino Race Against PartyPoker & Golden Nugget
  • Is the Keystone XL Pipeline Back?
  • ‘He Was Disappointed’: NATO’s Chief on Recent Trump Meeting
Prime Reports
  • Home
  • Popular Now
  • Crypto
  • Cybersecurity
  • Economy
  • Geopolitics
  • Global Markets
  • Politics
  • See More
    • Artificial Intelligence
    • Climate Risks
    • Defense
    • Healthcare Innovation
    • Science
    • Technology
    • World
Prime Reports
  • Home
  • Popular Now
  • Crypto
  • Cybersecurity
  • Economy
  • Geopolitics
  • Global Markets
  • Politics
  • Artificial Intelligence
  • Climate Risks
  • Defense
  • Healthcare Innovation
  • Science
  • Technology
  • World
Home»Cybersecurity»Storm-1175 Deploys Medusa Ransomware at ‘High Velocity’
Cybersecurity

Storm-1175 Deploys Medusa Ransomware at ‘High Velocity’

primereportsBy primereportsApril 7, 2026No Comments4 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Storm-1175 Deploys Medusa Ransomware at ‘High Velocity’
Share
Facebook Twitter LinkedIn Pinterest Email


Storm-1175 actors are running up-tempo campaigns to deliver Medusa ransomware, putting pressure on organizations to patch critical vulnerabilities faster. 

In a blog post on Monday, Microsoft Threat Intelligence detailed how Storm-1175, a financially motivated cybercrime group, is conducting “high velocity ransomware campaigns” that typically exploit known vulnerabilities in the sweet spot for threat actors: the time between a vulnerability’s initial disclosure and the widespread adoption of the patch. Microsoft also tied the exploitation of several zero-day vulnerabilities to the group.

Storm-1175’s playbook appears to be predicated on speed. Attackers move quickly from vulnerability exploitation to data exfiltration and, finally, delivery of Medusa ransomware, “often within a few days and, in some cases, within 24 hours,” according to Microsoft.

“The threat actor’s high operational tempo and proficiency in identifying exposed perimeter assets have proven successful, with recent intrusions heavily impacting healthcare organizations, as well as those in the education, professional services, and finance sectors in Australia, United Kingdom, and United States,” the blog post stated.

Related:Axios Attack Shows Complex Social Engineering Is Industrialized

The rapid pace of these attacks is the latest example of threat actors outpacing the typical response time for organizations to patch critical flaws. Sherrod DeGrippo, general manager of threat intelligence at Microsoft, tells Dark Reading that given Storm-1175’s operational speed, “patches should be prioritized immediately upon release.”

Storm-1175’s Exploitation of N-Days and Zero-Days

Microsoft noted that Storm-1175 has rapidly exploited more than a dozen known vulnerabilities or N-days, the most recent of which is CVE-2026-1731, a critical remote code execution flaw in BeyondTrust Remote Support and older versions of the vendor’s Privileged Remote Access (PRA). The vulnerability was initially disclosed Feb. 6 and quickly came under attack, with the Cybersecurity and Infrastructure Security Agency (CISA) adding it to the Known Exploited Vulnerabilities (KEV) catalog a week later.

Other notable flaws exploited by Storm-1175 include CVE-2025-31161, a critical authentication bypass vulnerability in CrushFTP’s file transfer software that also sparked a public disclosure dispute last spring; CVE-2024-27198, another critical authentication bypass flaw, this time affecting JetBrains’ TeamCity and seeing mass exploitation just days after public disclosure in March 2024; and CVE-2023-21529, one of three Microsoft Exchange vulnerabilities disclosed in the Patch Tuesday release for February 2023 (exploitation activity for CVE-2023-21529 was not confirmed prior to Monday’s blog post).

Related:Blast Radius of TeamPCP Attacks Expands Amid Hacker Infighting

Microsoft also connected a few zero-day vulnerabilities to Storm-1175 attacks. The most recent example is CVE-2026-23760, a critical authentication bypass vulnerability in SmarterMail that was exploited by various threat groups, including the China-linked Storm-2603. 

Additionally, Storm-1175 weaponized CVE-2025-10035, a maximum-severity flaw in GoAnywhere’s Managed File Transfer’s (MFT) License Servlet. Microsoft noted that both CVEs were exploited about a week before public disclosure. 

“While these more recent attacks demonstrate an evolved development capability or new access to resources like exploit brokers for Storm-1175, it is worth noting that GoAnywhere MFT has previously been targeted by ransomware attackers, and that the SmarterMail vulnerability was reportedly similar to a previously disclosed flaw,” the blog post stated. “These factors may have helped to facilitate subsequent zero-day exploitation activity by Storm-1175, who still primarily leverages N-day vulnerabilities.”

Security Solutions Tampering

Microsoft Threat Intelligence detailed other facets of Storm-1175’s campaigns, such as the use of remote monitoring and management (RMM) software for lateral movement, Impacket for credential dumping, and the command-line tool Rclone for data exfiltration.

Related:Iran Deploys ‘Pseudo-Ransomware,’ Revives Pay2Key Operations

One notable technique that the software giant highlighted was the group’s ability to tamper with security solutions, namely Microsoft Defender Antivirus. The blog post noted that the threat actors modified the program’s settings stored in Windows’ registry, allowing Medusa payloads to execute. 

Microsoft noted that such tampering requires an attacker to obtain access to highly privileged accounts first, which makes the credential dumping phase of Storm-1175’s attack chain very critical. “For this reason, prioritizing alerts related to credential theft activity, which typically indicate an active attacker in the environment, is essential to responding to ransomware signals and preventing attackers from gaining privileged account access,” Microsoft Threat Intelligence wrote in the blog post. 

DeGrippo says the tampering activity prevents the security program from scanning the targeted system’s C drive and allowing Medusa payloads to run without any alerts. To mitigate the threat, organizations should enable Windows Defender Antivirus’ tamper protection features across the tenant and take advantage of the “DisableLocalAdminMerge” setting, which prevents threat actors from using local administrator privileges to set antivirus exclusions.

Additionally, Microsoft recommended that organizations isolate Web-facing systems from the public Internet, and place any servers that must be publicly accessible behind a Web application firewall, proxy server, or DMZ. The company also urged customers to implement Windows’ Credential Guard, a security feature that protects credentials stored in process memory.



Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleWhale.io Launches the First AI Agent MCP for Crypto Casino By Chainwire
Next Article Bitcoin Hovers Around $69,000 as Trump’s Iran Deadline Looms
primereports
  • Website

Related Posts

Cybersecurity

Apple Intelligence AI Guardrails Bypassed in New Attack

April 9, 2026
Cybersecurity

Claude Managed Agents bring execution and control to AI agent workflows

April 9, 2026
Cybersecurity

Don’t just fight fraud, hunt it

April 9, 2026
Add A Comment
Leave A Reply Cancel Reply

Top Posts

Global Resources Outlook 2024 | UNEP

December 6, 20258 Views

The D Brief: DHS shutdown likely; US troops leave al-Tanf; CNO’s plea to industry; Crowded robot-boat market; And a bit more.

February 14, 20264 Views

German Chancellor Merz faces difficult mission to Israel – DW – 12/06/2025

December 6, 20254 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Latest Reviews

Subscribe to Updates

Get the latest tech news from FooBar about tech, design and biz.

PrimeReports.org
Independent global news, analysis & insights.

PrimeReports.org brings you in-depth coverage of geopolitics, markets, technology and risk – with context that helps you understand what really matters.

Editorially independent · Opinions are those of the authors and not investment advice.
Facebook X (Twitter) LinkedIn YouTube
Key Sections
  • World
  • Geopolitics
  • Popular Now
  • Artificial Intelligence
  • Cybersecurity
  • Crypto
All Categories
  • Artificial Intelligence
  • Climate Risks
  • Crypto
  • Cybersecurity
  • Defense
  • Economy
  • Geopolitics
  • Global Markets
  • Healthcare Innovation
  • Politics
  • Popular Now
  • Science
  • Technology
  • World
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms & Conditions
  • Disclaimer
  • Cookie Policy
  • DMCA / Copyright Notice
  • Editorial Policy

Sign up for Prime Reports Briefing – essential stories and analysis in your inbox.

By subscribing you agree to our Privacy Policy. You can opt out anytime.
Latest Stories
  • Five AI Compute Architectures Every Engineer Should Know: CPUs, GPUs, TPUs, NPUs, and LPUs Compared
  • UK’s warm and dry April 1976 was a taste of scorching summer to come | Drought
  • UK PM Keir Starmer visits Gulf to shore up ‘fragile’ US-Iran ceasefire | US-Israel war on Iran
© 2026 PrimeReports.org. All rights reserved.
Privacy Terms Contact

Type above and press Enter to search. Press Esc to cancel.