High-Velocity Ransomware Attacks Observed in China-Linked Storm-1175 Campaigns

Summary:

Recent threat intelligence highlights a surge in high-velocity ransomware attacks driven by the Storm-1175 threat group, which rapidly exploits both zero-day and newly disclosed vulnerabilities to compromise internet-facing systems within hours. The group leverages trusted administrative tools, remote monitoring software, and living-off-the-land techniques to evade detection, establish persistence, and move laterally across enterprise environments.

These attacks often culminate in the deployment of Medusa ransomware alongside data exfiltration, with the entire intrusion lifecycle frequently completed within 24 to 72 hours. Critical sectors, including healthcare, finance, education, and professional services, are particularly impacted, underscoring the need for accelerated patching, continuous monitoring of exposed assets, and stricter controls over administrative tools.

Technical Description:

Storm-1175 initiates intrusions by rapidly exploiting internet-facing applications using a combination of zero-day and N-day vulnerabilities, often chaining multiple exploits to deepen access. Observed vulnerabilities include CVE-2025-10035 and others affecting enterprise platforms.

Following initial compromise, the attackers establish persistence through web shells, newly created user accounts, or deployment of legitimate remote monitoring tools. Credential harvesting is conducted using widely available tools such as Mimikatz and Impacket to escalate privileges and expand access.

Lateral movement is achieved using living-off-the-land binaries such as PowerShell and PsExec, as well as remote monitoring and management platforms. The attackers weaken endpoint defenses by modifying Microsoft Defender Antivirus exclusions and firewall configurations. Data is then staged and exfiltrated using tools such as Rclone before Medusa ransomware is deployed across the environment. This process is typically completed within a short timeframe, often within 24 to 72 hours of initial access. The details and technicalities of the attack campaign are discussed further,

Delivery and Infection Chain:

Storm-1175 primarily gains initial access by exploiting zero-day and recently disclosed vulnerabilities in internet-facing systems. Frequently targeted platforms include Microsoft Exchange, Fortra GoAnywhere MFT, and SmarterMail, among others. In some cases, phishing campaigns, misconfigured remote monitoring tools, or exposed administrative interfaces are also used to initiate compromise.

The Infection chain was identified as follows,

  • Attackers exploit internet-facing systems using zero-day or recently disclosed vulnerabilities to gain initial access.
  • Persistence is established through web shells, newly created user accounts, or deployment of legitimate remote monitoring tools.
  • Credential harvesting is conducted using tools such as Mimikatz and Impacket to obtain elevated privileges.
  • Lateral movement is performed using PowerShell, PsExec, PDQ Deployer, and remote monitoring platforms.
  • Sensitive data is staged and exfiltrated using tools such as Bandizip and Rclone, followed by rapid deployment of Medusa ransomware.

Technical Capabilities:

Storm-1175 demonstrates advanced technical capabilities in both exploitation and post-compromise operations. The group effectively combines zero-day and N-day vulnerabilities to achieve rapid initial access and often chains multiple exploits to increase its foothold within targeted environments.

Once inside, persistence is maintained through web shells, new user accounts, and legitimate remote management tools. Credential harvesting using Mimikatz and Impacket enables privilege escalation, while lateral movement is facilitated through built-in system tools such as PowerShell and PsExec, as well as enterprise management platforms like PDQ Deployer.

The group employs strong defense evasion techniques, including modification of Microsoft Defender settings and firewall rules, and leverages legitimate remote management channels to mask malicious activity. Data exfiltration is conducted using tools such as Rclone, and ransomware deployment follows quickly, often within hours. The ability to rapidly weaponize newly disclosed vulnerabilities and operate across both Windows and Linux environments demonstrates a high level of technical maturity and operational agility.

Attribution and Evolution:

Storm-1175 is assessed to be a financially motivated threat actor with a focus on rapid, high-impact ransomware campaigns. Initially targeting Windows environments, the group has expanded its operations to include Linux-based systems such as Oracle WebLogic servers.

Since 2023, the group has exploited multiple known vulnerabilities, including several zero-days used prior to public disclosure. Their evolution reflects a dynamic and adaptive approach, characterized by rapid exploitation cycles, use of dual-use administrative tools, and a focus on high-value internet-facing assets.

Active Campaign and Geographic Spread:

Storm-1175 campaigns have been observed targeting organizations across multiple regions, including the United States, the United Kingdom, and Australia. Affected industries include healthcare, finance, education, and professional services.

The group’s operations are characterized by speed and scalability, with automated lateral movement techniques and the use of legitimate remote management tools enabling rapid spread across networks. The reliance on exposed internet-facing systems suggests that any organization with vulnerable infrastructure may be at risk, regardless of geographic location.

Conclusion:

This campaign represents a modern ransomware threat model characterized by rapid exploitation, stealthy use of legitimate tools, and accelerated attack timelines. By blending malicious activity with trusted administrative infrastructure, Storm-1175 is able to bypass traditional defenses and execute high-impact attacks within short timeframes.

Organizations must adopt proactive defense strategies that prioritize timely patching, strict access control, continuous monitoring, and detection of abnormal administrative activity to mitigate the risk posed by such high-velocity threats.

Impact:

This campaign represents a modern ransomware threat model characterized by rapid exploitation, stealthy use of legitimate tools, and accelerated attack timelines. By blending malicious activity with trusted administrative infrastructure, Storm-1175 is able to bypass traditional defenses and execute high-impact attacks within short timeframes.

Organizations must adopt proactive defense strategies that prioritize timely patching, strict access control, continuous monitoring, and detection of abnormal administrative activity to mitigate the risk posed by such high-velocity threats.

IOC and Context Details:

Topics Details
Tactic Name Initial Access, Execution, Persistence, Privilege Escalation, Defense Evasion, Credential Access, Lateral Movement, Exfiltration, Impact
Technique Name Exploit Public-Facing Application, Command and Scripting Interpreter, Account Manipulation, Credential Dumping, Remote Services, Data Staged, Data Encrypted for Impact
Sub Technique Name Zero-Day Exploitation, PowerShell, PsExec, Web Shells, Mimikatz, Impacket, RMM Tool Abuse, Rclone Exfiltration, Medusa Ransomware Deployment
Attack Type Malware
Targeted Applications Microsoft Exchange Server, Papercut, Ivanti Connect Secure & Policy Secure, ConnectWise ScreenConnect, JetBrains TeamCity, SimpleHelp, CrushFTP, Fortra GoAnywhere MFT, SmarterTools SmarterMail, BeyondTrust, Oracle WebLogic
Region Impacted United States, United Kingdom, Australia
Industry Impacted Healthcare, Education, Finance, Professional Services
IOC’s SHA-256:
0cefeb6210b7103fd32b996beff518c9b6e1691a97bb1cda7f5fb57905c4be96
9632d7e4a87ec12fdd05ed3532f7564526016b78972b2cd49a610354d672523c
e57ba1a4e323094ca9d747bfb3304bd12f3ea3be5e2ee785a3e656c3ab1e8086
5ba7de7d5115789b952d9b1c6cff440c9128f438de933ff9044a68fff8496d19

IP Addresses:
185.135.86[.]149
134.195.91[.]224
85.155.186[.]121
CVE CVE-2023-21529, CVE-2023-27351, CVE-2023-27350, CVE-2023-46805, CVE-2024-21887, CVE-2024-1708, CVE-2024-1709, CVE-2024-27198, CVE-2024-27199, CVE-2024-57726, CVE-2024-57727, CVE-2024-57728, CVE-2025-31161, CVE-2025-10035, CVE-2025-52691, CVE-2026-23760, CVE-2026-1731

Recommended Actions:

  • Apply security patches immediately for all known vulnerabilities, prioritizing internet-facing systems and critical applications.
  • Conduct continuous vulnerability scanning to identify exposed assets and misconfigurations in real time.
  • Restrict and monitor the use of remote monitoring and management tools, enforcing strong authentication and least-privilege access.
  • Deploy endpoint detection and response solutions capable of detecting abnormal PowerShell, PsExec, and Impacket activity.
  • Enforce multi-factor authentication across all administrative accounts and sensitive systems.
  • Monitor network traffic for anomalous data transfers, particularly to external or cloud-based destinations.
  • Maintain secure, offline backups of critical data and regularly test recovery procedures.
  • Provide ongoing cybersecurity awareness training focused on phishing, social engineering, and suspicious activity detection.

Reference:

https://www.microsoft.com/en-us/security/blog/2026/04/06/storm-1175-focuses-gaze-on-vulnerable-web-facing-assets-in-high-tempo-medusa-ransomware-operations/