Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

573+ Articles
117+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. News
  3. Microsoft Links Storm-1175 to Medusa Ransomware Zero-Day Campaign
Microsoft Links Storm-1175 to Medusa Ransomware Zero-Day Campaign
NEWS

Microsoft Links Storm-1175 to Medusa Ransomware Zero-Day Campaign

Microsoft has formally attributed Medusa ransomware zero-day attacks to Storm-1175, a China-based financially motivated cybercriminal group that has weaponized over 16 vulnerabilities across 10 software products — including two zero-days exploited before patches were available.

Dylan H.

News Desk

April 6, 2026
4 min read

Microsoft has formally attributed an ongoing wave of Medusa ransomware deployments to Storm-1175, a China-based financially motivated cybercriminal group operating with an unusually broad and aggressive exploit arsenal. The attribution, published by Microsoft Threat Intelligence, reveals a threat actor capable of leveraging 16 or more vulnerabilities across 10 different software products — including two active zero-days — to achieve rapid network compromise and ransomware deployment.

Storm-1175: Threat Actor Profile

Storm-1175 is classified as a financially motivated cybercriminal group with China-based infrastructure. Unlike many ransomware affiliates who rely on a narrow set of initial access techniques, Storm-1175 maintains a diverse and continuously updated portfolio of exploits targeting enterprise software at scale.

Microsoft's investigation found the group can move "from initial access to data exfiltration and deployment of Medusa ransomware, often within a few days and, in some cases, within 24 hours" — a pace that places them among the most operationally efficient ransomware actors currently tracked.

Zero-Day Arsenal

Storm-1175 has been confirmed deploying two specific zero-day vulnerabilities:

CVE-2026-23760 — SmarterTools SmarterMail Authentication Bypass

An authentication bypass vulnerability in SmarterMail, the widely deployed business email server. The flaw allowed Storm-1175 to gain unauthorized access to mail server environments without valid credentials — a particularly high-value initial foothold given the volume of sensitive data traversing enterprise email infrastructure.

CVE-2025-10035 — GoAnywhere Managed File Transfer

A maximum-severity vulnerability in Fortra's GoAnywhere MFT platform. Microsoft confirmed Storm-1175 exploited this flaw over one week before the vendor released a patch, meaning targeted organizations had no remediation option available at the time of compromise.

Broader N-Day Exploitation

Beyond the two active zero-days, Storm-1175 has demonstrated sustained capability across a wide range of enterprise software vulnerabilities:

SoftwareCVE(s)
Microsoft ExchangeCVE-2023-21529
PaperCut MF/NGCVE-2023-27351, CVE-2023-27350
Ivanti Connect SecureCVE-2023-46805, CVE-2024-21887
ConnectWise ScreenConnectCVE-2024-1709, CVE-2024-1708
JetBrains TeamCityMultiple
SimpleHelpMultiple
CrushFTPMultiple
BeyondTrustMultiple

The breadth of this portfolio — spanning email, file transfer, VPN, print management, CI/CD, and remote access platforms — reflects a threat actor that systematically targets the perimeter of enterprise environments regardless of the specific software stack in use.

Post-Compromise Attack Chain

After establishing initial access, Storm-1175 follows a consistent multi-stage pattern:

1. Initial Access
   └── Zero-day or n-day exploitation of web-facing systems

2. Persistence
   └── Immediate creation of new user accounts
   └── Deployment of RMM tools (ScreenConnect, AnyDesk, SimpleHelp)

3. Credential Harvesting
   └── Extraction of stored credentials
   └── Disabling of security and endpoint protection software

4. Data Exfiltration
   └── Sensitive files stolen for double-extortion leverage

5. Ransomware Deployment
   └── Medusa ransomware payload detonated across network

The reliance on legitimate remote management tools during post-compromise operations is a deliberate choice to evade detection — these tools are commonly whitelisted in enterprise environments and generate traffic that blends with normal IT activity.

Impact and Victim Sectors

Storm-1175's Medusa deployments have targeted organizations across Australia, the United Kingdom, and the United States, with CISA estimating that Medusa ransomware has affected more than 300 critical infrastructure organizations in the US alone.

Primary target sectors include:

  • Healthcare — hospitals, medical centers, healthcare systems
  • Education — universities and school districts
  • Professional services — law firms, consulting
  • Financial services — banks and financial institutions

Microsoft's Detection and Mitigation Guidance

Microsoft recommends organizations prioritize the following defensive measures given Storm-1175's tactics:

  1. Patch SmarterMail and GoAnywhere MFT immediately if CVE-2026-23760 or CVE-2025-10035 remain unpatched in your environment
  2. Audit remote management tool usage — detect ConnectWise ScreenConnect, AnyDesk, or SimpleHelp deployments outside approved IT workflows
  3. Monitor for unexpected privileged account creation — a consistent early-stage persistence indicator for this group
  4. Enable MFA across all internet-facing systems — reduces the blast radius of credential-based lateral movement
  5. Segment networks to prevent ransomware from propagating from an initial beachhead across the entire environment

Sources: BleepingComputer, Microsoft Threat Intelligence

#Ransomware#Zero-Day#Microsoft#China#BleepingComputer#Storm-1175#Threat Intelligence

Related Articles

Disgruntled Researcher Leaks BlueHammer Windows Zero-Day Exploit

A security researcher operating under the aliases 'Chaotic Eclipse' and 'Nightmare-Eclipse' has publicly released exploit code for an unpatched Windows local privilege escalation vulnerability after a dispute with Microsoft's Security Response Center. The exploit grants SYSTEM access via the SAM database on Windows client systems.

5 min read

Medusa Ransomware Group Exploits Zero-Days to Strike Within 24 Hours

Microsoft warns that Medusa ransomware operators are exploiting zero-day vulnerabilities approximately one week before public disclosure, enabling the group to move from initial access to full ransomware deployment in under 24 hours. Healthcare, education, and finance sectors are primary targets.

4 min read

Evolution of Ransomware: Multi-Extortion Ransomware Attacks

Modern ransomware has evolved far beyond simple file encryption. Multi-extortion tactics — combining encryption, data theft, and public leak threats —...

4 min read
Back to all News