Microsoft has published a detailed analysis of Storm-1175, the financially motivated threat actor behind the Medusa ransomware. The group is characterized by its extremely high operational tempo, capable of weaponizing publicly disclosed N-day vulnerabilities and, in some cases, zero-day vulnerabilities, to achieve initial access and deploy ransomware within 24 to 48 hours. This rapid attack cycle leaves a minimal window for defenders to patch and respond. The group primarily targets vulnerable, internet-facing assets such as Microsoft Exchange, GoAnywhere MFT, and SmarterMail. Post-compromise, they use a variety of legitimate remote access tools like ConnectWise ScreenConnect and AnyDesk for persistence and lateral movement, culminating in data exfiltration and encryption. The report underscores the critical need for rapid patch management and robust attack surface monitoring.
Threat Actor: Storm-1175 Associated Malware: Medusa Ransomware
Storm-1175 represents a significant evolution in ransomware operations, prioritizing speed above all else. Their core strategy involves:
PowerShell, PsExec) to blend in with normal administrative activity and evade detection.This high-tempo model is designed to overwhelm traditional incident response timelines and capitalize on the gap between vulnerability disclosure and enterprise-wide patching.
Storm-1175's attack chain is swift and methodical. A typical operation follows these steps:
T1190 - Exploit Public-Facing Application against products like Microsoft Exchange (CVE-2023-21529), GoAnywhere MFT (CVE-2025-10035), and SmarterMail (CVE-2026-23760). They often deploy a web shell for initial persistence.T1136 - Create Account) and use credential theft tools to gain higher privileges.T1562 - Impair Defenses) to operate undetected.PsExec and legitimate RMM software like ConnectWise ScreenConnect and AnyDesk (T1219 - Remote Access Software) to move across the network.T1486 - Data Encrypted for Impact).The primary impact is severe business disruption due to ransomware deployment, coupled with the threat of data leakage from double extortion tactics. The speed of the attack means that organizations may have little to no warning before critical systems are encrypted. Sectors heavily impacted include:
The use of zero-days and rapid N-day exploitation means that any organization with unpatched, internet-facing infrastructure is a potential target. The financial and operational consequences of a successful Medusa attack are substantial.
Detection Strategies:
Response Actions:
Microsoft reports Storm-1175 now deploys Medusa ransomware in under 24 hours, further shrinking the defense window for organizations.
Implement a rapid patching program for internet-facing systems to close the window of opportunity for Storm-1175.
Mapped D3FEND Techniques:
While not the primary vector, training users to recognize and report phishing can prevent initial access in some variants of their campaigns.
Use application control to block the execution of unauthorized remote access software like AnyDesk and SimpleHelp.
The core of Storm-1175's strategy is exploiting the delay between vulnerability disclosure and patching. To counter this, organizations must implement an aggressive, risk-based patch management program. All internet-facing systems (e.g., Exchange, VPNs, MFT servers) must be inventoried and monitored continuously. When a critical vulnerability like those exploited by Storm-1175 is announced, the patching process must be initiated within hours, not days or weeks. This requires pre-approved emergency change control procedures and automated deployment mechanisms. The goal is to shrink the attack window to a point where automated scanning and exploitation are no longer viable. This is the single most effective defense against this threat actor's primary TTP.
Storm-1175 relies on legitimate but unauthorized remote access tools like AnyDesk, SimpleHelp, and ConnectWise ScreenConnect for persistence and lateral movement. A robust application control policy using Executable Denylisting (or the more secure Allowlisting) can neutralize this tactic. Identify all RMM tools that are not approved for corporate use and create rules in your EDR or application control solution to block their execution. This should be enforced most strictly on servers, especially domain controllers and critical application servers. For organizations that use one of these tools legitimately, rules should be configured to only allow execution from specific administrative workstations, preventing their widespread use by an attacker who has compromised a standard user endpoint.
Since Storm-1175 uses legitimate tools, detection must focus on anomalous behavior. Implement process analysis and monitoring, focusing on parent-child process relationships. For example, a web server process (e.g., w3wp.exe for IIS) spawning powershell.exe or cmd.exe is highly suspicious and indicative of web shell execution. Similarly, monitor for RMM tools being launched by non-interactive user accounts or processes. Create SIEM and EDR alerts for these specific behavioral patterns. Correlating these process-level events with network logs showing connections to the exploited web-facing asset can provide high-fidelity alerts of an active intrusion, allowing for rapid response before ransomware is deployed.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats