Storm-1175: Rapid Ransomware Campaigns Weaponizing N-Day Vulnerabilities

by Priyanka Patel

Cybersecurity researchers have identified a high-velocity threat actor, tracked as Storm-1175, that is specializing in a race against the clock. The group focuses its gaze on vulnerable web-facing assets, exploiting the critical window of time between when a software vulnerability is publicly disclosed and when organizations actually apply the necessary patches.

Operating with an aggressive operational tempo, Storm-1175 leverages these “N-day” vulnerabilities to gain initial entry into corporate networks. Once inside, the group moves with startling speed; in some instances, the transition from initial access to full-scale data exfiltration and the deployment of Medusa ransomware occurs within 24 hours. In most cases, the entire attack chain is completed within a few days.

The impact of these high-tempo Medusa ransomware operations has been felt across several critical sectors, including healthcare, finance, professional services, and education. Intrusions have been documented in the United States, the United Kingdom, and Australia, highlighting a broad geographic reach and a preference for organizations that may struggle to patch perimeter systems instantaneously.

As a former software engineer, I find the group’s proficiency in “exploit chaining” particularly concerning. Rather than relying on a single flaw, Storm-1175 often links multiple vulnerabilities together to escalate privileges or achieve remote code execution (RCE). This methodical approach allows them to bypass layered defenses and establish a deep foothold before security teams even realize the perimeter has been breached.

The Mechanics of Rapid Exploitation

The core of Storm-1175’s success is its ability to weaponize new vulnerabilities almost immediately after they are announced. Since 2023, Microsoft Threat Intelligence has observed the group exploiting more than 16 different vulnerabilities. This rapid rotation of exploits ensures they always have a working key for a variety of “locked” doors across the internet.

A stark example of this speed occurred with CVE-2025-31324, which affected SAP NetWeaver. The security flaw was disclosed on April 24, 2025; by April 25, Storm-1175 was already exploiting it in the wild. This 24-hour turnaround leaves virtually no room for manual patching cycles in large enterprises.

Figure 1. Timeline of disclosure and exploitation of vulnerabilities used by Storm-1175 in campaigns

While N-days are their primary tool, the group has evolved. Researchers have identified at least three zero-day vulnerabilities used by the actor, including CVE-2026-23760 in SmarterMail and CVE-2025-10035 in GoAnywhere Managed File Transfer. In both cases, the group exploited the flaws a full week before they were publicly disclosed, suggesting either an advanced internal development capability or the utilize of professional exploit brokers.

The group is not limited to Windows environments. In late 2024, they were observed targeting vulnerable Oracle WebLogic instances on Linux systems, demonstrating a cross-platform capability that expands their potential target list.

Lateral Movement and the Abuse of IT Tools

Once the initial breach is achieved—often via a web shell or a remote access payload—Storm-1175 focuses on persistence. They typically create new user accounts and immediately elevate them to administrator status to ensure they cannot be easily locked out of the system.

Lateral Movement and the Abuse of IT Tools
Diagram showing the Storm-1175 attack chain from Exploitation to Impact
Figure 2. Storm-1175 attack chain

To move through the network, the group employs a “living-off-the-land” strategy, using legitimate system binaries like PowerShell and PsExec to avoid detection. They have also been seen using Cloudflare tunnels, cleverly renamed to mimic legitimate system files like conhost.exe, to facilitate Remote Desktop Protocol (RDP) movement. If RDP is disabled by a company’s security policy, the attackers simply use their administrative privileges to rewrite the Windows Firewall rules and open the port themselves.

Screenshot of code for modifying the firewall and enabling RDP
Figure 4. From an initial foothold after the compromise of a SmarterMail application, Storm-1175 modifies the firewall and enables remote desktop access for lateral movement, writing the results of the command to a TXT file

Perhaps most dangerously, Storm-1175 heavily relies on Remote Monitoring and Management (RMM) tools. By deploying software like AnyDesk, ConnectWise ScreenConnect, or Atera, they essentially install their own “backdoor” that looks like legitimate IT support activity. They also leverage PDQ Deployer, a tool designed for system administrators to install software silently, to push the final Medusa ransomware payloads across the entire network simultaneously.

Credential Theft and Security Sabotage

The group’s path to the “crown jewels”—the Domain Controller—usually involves aggressive credential harvesting. They use Impacket and Mimikatz to dump passwords from the Local Security Authority Subsystem Service (LSASS). In some cases, they have even used scripts to recover passwords from Veeam backup software, which allows them to pivot to remote hosts that were previously disconnected.

Before deploying the ransomware, Storm-1175 systematically disables security software. They modify the Windows registry to tamper with Microsoft Defender Antivirus and use encoded PowerShell commands to add the entire C: drive to the antivirus exclusion list. This effectively blinds the organization’s security tools, allowing the ransomware to execute without triggering alerts.

The Final Phase: Double Extortion

Storm-1175 utilizes the Medusa ransomware model, which is based on a “Ransomware-as-a-Service” (RaaS) structure. This involves a double extortion tactic: the attackers encrypt the victim’s data and simultaneously steal sensitive files to a remote cloud resource using tools like Rclone, and Bandizip.

The stolen data is then held hostage on a dedicated leak site. If the victim refuses to pay for the decryption key, the group threatens to publish the private data publicly. This pressure tactic is designed to force payment even from organizations that have robust offline backups and can technically recover their systems without a key.

Common Tools Used by Storm-1175
Attack Stage Primary Tool/Method Purpose
Initial Access N-Day/Zero-Day Exploits Perimeter breach via web-facing assets
Persistence RMM Tools (e.g., AnyDesk) Maintaining covert access
Lateral Movement PDQ Deployer / PsExec Spreading across the network
Exfiltration Rclone / Bandizip Stealing data for double extortion
Impact Medusa Ransomware Data encryption and ransom demand

To defend against these tactics, security professionals are encouraged to implement Credential Guard and enforce strict multi-factor authentication (MFA) on all RMM tools. Reducing the use of local administrator rights and employing external attack surface management tools can help organizations identify the same “exposed” assets that Storm-1175 is currently scanning for.

As the group continues to refine its ability to weaponize zero-day flaws, the window for patching is shrinking. The next critical checkpoint for defenders will be the monitoring of emerging vulnerabilities in managed file transfer (MFT) and mail server software, which have historically been the primary entry points for this actor.

Do you have experience defending against high-velocity ransomware? Share your thoughts and strategies in the comments below.

You may also like

Leave a Comment