Security

Medusa Ransomware: Storm-1175 Targets Web Assets

3 min read

Summary

Microsoft Threat Intelligence warns that Storm-1175 is rapidly exploiting vulnerable internet-facing systems to deploy Medusa ransomware, sometimes within 24 hours of initial access. The group’s focus on newly disclosed flaws, web shells, RMM tools, and fast lateral movement makes patch speed, exposure management, and post-compromise detection critical for defenders.

Audio Summary

0:00--:--
Need help with Security?Talk to an Expert

Storm-1175 and Medusa ransomware: Why this matters

Microsoft Threat Intelligence has published new research on Storm-1175, a financially motivated threat actor running fast-moving Medusa ransomware campaigns. The key concern for defenders is speed: the group targets exposed web-facing systems and can move from exploitation to ransomware deployment in as little as 24 hours.

For IT and security teams, this is another reminder that internet-facing assets, delayed patching, and weak visibility across perimeter systems create a narrow window for response.

What’s new

Microsoft says Storm-1175 has exploited more than 16 vulnerabilities since 2023, focusing on the gap between public disclosure and patch adoption. Targeted technologies include:

  • Microsoft Exchange
  • Ivanti Connect Secure and Policy Secure
  • ConnectWise ScreenConnect
  • JetBrains TeamCity
  • Papercut
  • SimpleHelp
  • CrushFTP
  • GoAnywhere MFT
  • SmarterMail
  • BeyondTrust

Notably, Microsoft also observed the actor using some zero-day exploits, including cases where exploitation happened a week before public disclosure.

How the attack chain works

After gaining access through a vulnerable web-facing asset, Storm-1175 typically:

  • Establishes persistence using a web shell or remote access payload
  • Creates new local accounts and adds them to administrator groups
  • Uses LOLBins such as PowerShell and PsExec
  • Moves laterally with RDP, sometimes enabling it through firewall changes
  • Relies on RMM tools like Atera, AnyDesk, ScreenConnect, MeshAgent, and SimpleHelp
  • Uses tools such as PDQ Deployer and Impacket for payload delivery and lateral movement
  • Steals credentials, tampers with security controls, exfiltrates data, and deploys Medusa ransomware

This combination of legitimate admin tools and rapid execution makes activity harder to distinguish from normal IT operations.

Impact on IT administrators

Organizations in healthcare, education, professional services, and finance have been heavily affected, particularly in the US, UK, and Australia. For administrators, the biggest risks are:

  • Unpatched or newly disclosed vulnerabilities on internet-facing systems
  • Poor visibility into exposed perimeter assets
  • Overly permissive RDP and firewall settings
  • Unmonitored use of RMM tools in production environments

The report also highlights the importance of detecting post-compromise behavior, not just blocking initial exploitation.

Security and IT teams should prioritize the following:

  • Patch exposed systems quickly, especially web-facing applications
  • Inventory and continuously monitor all external attack surface assets
  • Review and restrict RMM tool usage to approved platforms and accounts
  • Audit for unauthorized new admin accounts and firewall changes
  • Monitor for suspicious use of PowerShell, PsExec, PDQ Deploy, and Impacket
  • Ensure Defender and related detection rules are enabled and tuned
  • Validate ransomware recovery plans, including offline backups and incident response workflows

Microsoft’s guidance reinforces a practical reality: if attackers can weaponize a flaw within days or even hours, security teams need both faster patching and stronger detection of lateral movement inside the network.

Need help with Security?

Our experts can help you implement and optimize your Microsoft solutions.

Talk to an Expert

Stay updated on Microsoft technologies

Storm-1175Medusa ransomwarevulnerability managementweb-facing assetsMicrosoft Threat Intelligence

Related Posts

Security

Device Code Phishing: AI-Driven Campaign Escalates

Microsoft Defender Security Research detailed a large-scale phishing campaign that abuses the OAuth device code flow using AI-generated lures, dynamic code generation, and automated backend infrastructure. The campaign raises the risk for organizations because it improves attacker success rates, bypasses traditional detection patterns, and enables token theft, inbox rule persistence, and Microsoft Graph reconnaissance.

Security

AI Cyberattacks Accelerate Threats Across Attack Chain

Microsoft warns that threat actors are now embedding AI across the full cyberattack lifecycle, from reconnaissance and phishing to malware development and post-compromise operations. For defenders, this means faster, more precise attacks, higher phishing success rates, and a growing need to strengthen identity, MFA protections, and visibility into AI-driven attack surfaces.

Security

PHP Webshells on Linux: Cookie-Controlled Evasion

Microsoft warns that threat actors are using HTTP cookies to control PHP webshells on Linux hosting environments, helping malicious code stay dormant unless specific cookie values are present. The technique reduces visibility in routine logs, supports persistence through cron jobs, and highlights the need for stronger monitoring, web protection, and endpoint detection on hosted Linux workloads.

Security

Axios npm Supply Chain Compromise: Mitigation Guide

Microsoft warned that malicious Axios npm versions 1.14.1 and 0.30.4 were used in a supply chain attack attributed to Sapphire Sleet. Organizations using the affected packages should immediately rotate secrets, downgrade to safe versions, and review developer endpoints and CI/CD systems for compromise.

Security

Critical Infrastructure Security Readiness in 2026

Microsoft says the threat model for critical infrastructure has shifted from opportunistic attacks to persistent, identity-driven access designed for future disruption. For IT and security leaders, the message is clear: reduce exposure, harden identity, and validate operational readiness now as regulations and nation-state activity intensify.

Security

AI Security Fundamentals: Practical CISO Guidance

Microsoft is advising CISOs to secure AI systems using the same core controls they already apply to software, identities, and data access. The guidance highlights least privilege, prompt injection defenses, and using AI itself to uncover permissioning issues before attackers or users do.