Ransomware & Malware

Storm-1175 Medusa Ransomware N-Day Exploits

Everyone figured ransomware was slowing down after the big busts. Then Storm-1175 shows up, turning fresh CVEs into extortion goldmines overnight.

Storm-1175 attack chain from vuln exploit to Medusa ransomware deployment

Key Takeaways

  • Storm-1175 turns N-day vulns into ransomware in under 48 hours, chaining exploits for speed.
  • Web-facing assets like Exchange and Ivanti are prime targets; patch windows are shrinking.
  • Zero-day use signals pro-level access—defenders need perimeter hardening now.

Storm-1175. That’s the name Microsoft slapped on this crew, and it’s already rewriting the ransomware playbook. We all expected the post-Conti era to mean slower ops—bigger groups splintered, law enforcement cracking down, patches rolling out faster. Nope. This lot’s cranking out Medusa ransomware hits at warp speed, zeroing in on web-facing screw-ups before IT teams even blink.

What changes everything? Their tempo. From vuln disclosure to your data encrypted: days, sometimes hours. Healthcare orgs in the US, UK, Australia—bam. Education, finance too. It’s not brute force; it’s surgical precision on exposed edges.

How Storm-1175 Sniffs Out the Weak Spots

Look, perimeter defense was supposed to be table stakes by 2025. Firewalls, WAFs, the works. But Storm-1175 treats public scanners like Shodan or Censys as their shopping list. They grab a fresh CVE—say, CVE-2025-31324 in SAP NetWeaver, dropped April 24—and boom, exploitation the next day. That’s not luck; that’s a pipeline: disclose, reverse, weaponize, probe, pounce.

They chain ‘em too. Remember OWASSRF back in ‘23? CVE-2022-41080 cracks the OWA door on Exchange, then CVE-2022-41082 slams in RCE. Linux? Oracle WebLogic gets love. And zero-days—three spotted, like CVE-2026-23760 in SmarterMail, a week early. (SmarterMail’s no stranger to this rodeo; echoes of old flaws make it ripe.)

Since 2023, Microsoft Threat Intelligence has observed exploitation of over 16 vulnerabilities, including: CVE-2023-21529 (Microsoft Exchange), CVE-2023-27351 and CVE-2023-27350 (Papercut), CVE-2023-46805 and CVE-2024-21887 (Ivanti Connect Secure and Policy Secure)…

That’s their hit list. Rotates fast, hits the unpatched window hard.

But here’s my take—the one Microsoft glosses over. This isn’t evolution; it’s industrialization. Storm-1175’s borrowing from state actors’ zero-day mills, or maybe cutting checks to brokers. Remember Equation Group’s Tailored Access Platform? Custom exploits on tap. Prediction: by 2026, half their kit goes zero-day as N-day windows shrink. Patches? Too late.

Why Does Storm-1175 Move So Damn Fast?

High-tempo ops demand rehearsal. Post-access? New user accounts for persistence. RMM tools—AnyDesk, ScreenConnect—for lateral jaunts. Credential dumps via Mimikatz kin. Security tampers: EDR neutered. Then exfil, encrypt, Medusa note drops. All in 24-48 hours.

It’s the ‘why’ that bites. Web-facing assets scream “exposed” because orgs prioritize inside-out security. Legacy Exchange, JetBrains TeamCity, Ivanti gateways—convenient, sure, but sitting ducks. Storm-1175’s not guessing; they’re mass-scanning, prioritizing high-value sectors. Healthcare? Juicy data, compliance fines amplify pain.

And the chaining— that’s architectural rot exposed. One vuln gets a foothold; the next escalates. No segmentation? Game over.

Pause. We’ve seen this before. LockBit 3.0 promised speed, delivered slop. Storm-1175? Cleaner, meaner. Their TTPs mirror the herd—living-off-the-land—but execution’s pro. Microsoft calls it “financially motivated”; I’d say venture-backed blackhat.

Is Your Perimeter Storm-1175-Proof?

Short answer: probably not. They hit CrushFTP (CVE-2025-31161), GoAnywhere (zero-day), BeyondTrust (CVE-2026-1731). Common thread? Internet-facing management interfaces, auth bypasses, RCE paths. Fix? Inventory everything web-exposed. Patch in hours, not weeks. Assume breach: microsegment, least-priv webshells.

But orgs drag feet. Why? Alert fatigue, shadow IT, vendor lag. Storm-1175 exploits that gap—relentlessly.

Deeper why: cloud migration’s half-done. Hybrid messes leave on-prem relics wide open. Shift your architecture—zero trust edges, ephemeral creds. Or become their next case study.

They adapt too. Linux pivot? WebLogic hints at broader nets. Zero-days signal R&D bump—exploit markets maturing, lowering barriers.

What Happens After They’re In?

Persistence first: rogue accounts. Lateral via RDP, SMB. Dumps galore. Then tamper—AV off, logs flushed. Exfil via cloud proxies. Ransomware? Medusa’s lean, double-extortion ready.

Unique angle: this tempo forces defender rethink. No more “weeks to dwell.” Detection windows? Minutes. EDR must flag anomaly chains—rapid account creation post-exploit, say. Behavioral baselines on perimeters.

Corporate spin check: Microsoft’s blog pushes defense-in-depth. Solid, but reads like vendor brochure. Real talk—they tracked years of this; why no earlier broker busts?

Bottom line. Storm-1175’s gaze on web vulns isn’t passing. It’s the new normal. Patch faster, expose less, or pay.


🧬 Related Insights

Frequently Asked Questions

What is Storm-1175 ransomware group?

Storm-1175 is the Microsoft tag for a fast-moving crew deploying Medusa ransomware, specializing in quick exploits of fresh web vulns.

How does Storm-1175 get initial access?

They weaponize N-day and zero-day CVEs in products like Exchange, Ivanti, JetBrains—scanning exposed internet assets and chaining for RCE.

Which sectors does Storm-1175 target?

Primarily healthcare, education, pro services, finance—in US, UK, Australia.

Sarah Chen
Written by

AI research editor covering LLMs, benchmarks, and the race between frontier labs. Previously at MIT CSAIL.

Frequently asked questions

What is Storm-1175 ransomware group?
Storm-1175 is the Microsoft tag for a fast-moving crew deploying Medusa ransomware, specializing in quick exploits of fresh web vulns.
How does Storm-1175 get initial access?
They weaponize N-day and zero-day CVEs in products like Exchange, Ivanti, JetBrains—scanning exposed internet assets and chaining for RCE.
Which sectors does Storm-1175 target?
Primarily healthcare, education, pro services, finance—in US, UK, Australia.

Worth sharing?

Get the best Cybersecurity stories of the week in your inbox — no noise, no spam.

Originally reported by Microsoft Security Blog

Stay in the loop

The week's most important stories from Threat Digest, delivered once a week.