Security

Medusa Ransomware: Storm-1175 Targets Web Assets

3 min read

Summary

Microsoft Threat Intelligence warns that Storm-1175 is rapidly exploiting vulnerable internet-facing systems to deploy Medusa ransomware, sometimes within 24 hours of initial access. The group’s focus on newly disclosed flaws, web shells, RMM tools, and fast lateral movement makes patch speed, exposure management, and post-compromise detection critical for defenders.

Audio Summary

0:00--:--
Need help with Security?Talk to an Expert

Storm-1175 and Medusa ransomware: Why this matters

Microsoft Threat Intelligence has published new research on Storm-1175, a financially motivated threat actor running fast-moving Medusa ransomware campaigns. The key concern for defenders is speed: the group targets exposed web-facing systems and can move from exploitation to ransomware deployment in as little as 24 hours.

For IT and security teams, this is another reminder that internet-facing assets, delayed patching, and weak visibility across perimeter systems create a narrow window for response.

What’s new

Microsoft says Storm-1175 has exploited more than 16 vulnerabilities since 2023, focusing on the gap between public disclosure and patch adoption. Targeted technologies include:

  • Microsoft Exchange
  • Ivanti Connect Secure and Policy Secure
  • ConnectWise ScreenConnect
  • JetBrains TeamCity
  • Papercut
  • SimpleHelp
  • CrushFTP
  • GoAnywhere MFT
  • SmarterMail
  • BeyondTrust

Notably, Microsoft also observed the actor using some zero-day exploits, including cases where exploitation happened a week before public disclosure.

How the attack chain works

After gaining access through a vulnerable web-facing asset, Storm-1175 typically:

  • Establishes persistence using a web shell or remote access payload
  • Creates new local accounts and adds them to administrator groups
  • Uses LOLBins such as PowerShell and PsExec
  • Moves laterally with RDP, sometimes enabling it through firewall changes
  • Relies on RMM tools like Atera, AnyDesk, ScreenConnect, MeshAgent, and SimpleHelp
  • Uses tools such as PDQ Deployer and Impacket for payload delivery and lateral movement
  • Steals credentials, tampers with security controls, exfiltrates data, and deploys Medusa ransomware

This combination of legitimate admin tools and rapid execution makes activity harder to distinguish from normal IT operations.

Impact on IT administrators

Organizations in healthcare, education, professional services, and finance have been heavily affected, particularly in the US, UK, and Australia. For administrators, the biggest risks are:

  • Unpatched or newly disclosed vulnerabilities on internet-facing systems
  • Poor visibility into exposed perimeter assets
  • Overly permissive RDP and firewall settings
  • Unmonitored use of RMM tools in production environments

The report also highlights the importance of detecting post-compromise behavior, not just blocking initial exploitation.

Security and IT teams should prioritize the following:

  • Patch exposed systems quickly, especially web-facing applications
  • Inventory and continuously monitor all external attack surface assets
  • Review and restrict RMM tool usage to approved platforms and accounts
  • Audit for unauthorized new admin accounts and firewall changes
  • Monitor for suspicious use of PowerShell, PsExec, PDQ Deploy, and Impacket
  • Ensure Defender and related detection rules are enabled and tuned
  • Validate ransomware recovery plans, including offline backups and incident response workflows

Microsoft’s guidance reinforces a practical reality: if attackers can weaponize a flaw within days or even hours, security teams need both faster patching and stronger detection of lateral movement inside the network.

Need help with Security?

Our experts can help you implement and optimize your Microsoft solutions.

Talk to an Expert

Stay updated on Microsoft technologies

Storm-1175Medusa ransomwarevulnerability managementweb-facing assetsMicrosoft Threat Intelligence

Related Posts

Security

@antv npm Attack Hits CI/CD Secrets and Tokens

Microsoft has disclosed an active supply chain attack involving compromised @antv npm packages that used malicious preinstall scripts to steal credentials from GitHub Actions and other CI/CD environments. The campaign matters because it spread through popular downstream dependencies, putting developer pipelines, cloud secrets, and software supply chains at risk.

Security

Microsoft Gaming Security: Key Risks and Defenses

Microsoft’s latest Deputy CISO post explains why securing gaming requires a different approach than traditional enterprise IT. The company outlines the distinct risks across gaming platforms, studios, and shared central teams, and highlights how Entra ID, Purview, Defender for Cloud, and Sentinel help balance security with player experience and developer agility.

Security

Microsoft RAMPART and Clarity Open-Sourced

Microsoft has open-sourced RAMPART and Clarity, two tools aimed at improving safety in agentic AI development. RAMPART brings repeatable adversarial and regression testing into CI pipelines, while Clarity helps teams challenge design assumptions early before code is written.

Security

Fox Tempest Malware Signing Service Disrupted

Microsoft has disrupted Fox Tempest, a malware-signing-as-a-service operation that helped cybercriminals make ransomware and other malware appear legitimately signed. The takedown matters because the group abused Microsoft Artifact Signing, created more than 1,000 fraudulent certificates, and enabled attacks that could bypass security controls more easily.

Security

Storm-2949 Cloud Breach: Entra ID to Azure Attack

Microsoft detailed how Storm-2949 turned a socially engineered Microsoft Entra ID compromise into broad data theft across Microsoft 365 and Azure. The case highlights how identity attacks can escalate quickly through legitimate cloud management features, making stronger MFA controls, monitoring, and cross-platform detections critical for defenders.

Security

Microsoft Security for SMBs in an AI-Powered World

Microsoft is urging small and medium businesses to treat cybersecurity as a core business risk as AI makes phishing, malware, and identity attacks faster and more effective. The company highlights Microsoft 365 Business Premium and integrated security controls as a practical way for growing businesses to protect users, devices, email, and cloud apps without adding major complexity.