Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Artemis II sets human spaceflight record with historic lunar flyby

How IH-MIE is accelerating hydrogen mobility across Europe

China-linked Storm-1175 exploits zero-day to rapidly deploy Medusa ransomware

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » China-linked Storm-1175 exploits zero-day to rapidly deploy Medusa ransomware
Identity

China-linked Storm-1175 exploits zero-day to rapidly deploy Medusa ransomware

By April 7, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Ravi LakshmananApril 7, 2026Vulnerability/Threat Intelligence

China-based threat actors known for deploying Medusa ransomware are said to be involved in weaponizing a combination of zero-day and N-day vulnerabilities to orchestrate “high-velocity” attacks and compromise vulnerable internet-connected systems.

The Microsoft Threat Intelligence team said, “Due to the attackers’ high operational tempo and proficiency in identifying exposed perimeter assets, recent intrusions have had a significant impact on healthcare organizations as well as the education, professional services, and financial sectors in Australia, the United Kingdom, and the United States.”

Storm-1175 attacks leverage recently published vulnerabilities and, in some cases, pre-public zero-day exploits to gain initial access. Some incidents include attackers chaining together multiple exploits (such as OWASSRF) for post-compromise activity.

Once financially motivated cybercriminals gain a foothold, they move quickly to steal data and deploy Medusa ransomware within days, or in some incidents, within 24 hours.

To aid in these efforts, the group creates persistence by creating new user accounts, deploying web shells or legitimate remote monitoring and management (RMM) software for lateral movement, performing credential theft, and disrupting the normal functioning of security solutions before dropping ransomware.

Storm-1175 is believed to be associated with over 16 vulnerability exploits since 2023.

CVE-2025-10035 and CVE-2026-23760 are both said to have been exploited as zero-days before being released to the public. As of late 2024, the hacking team has demonstrated a talent for targeting Linux systems, including exploiting vulnerable Oracle WebLogic instances across multiple organizations. However, the exact vulnerabilities weaponized in these attacks are still unknown.

“Storm-1175 takes advantage of a period when many organizations are unprotected to rapidly rotate exploits between publication and patch availability or adoption,” Microsoft said.

Some of the notable tactics observed in these attacks are:

Using resident binaries (LOLBins) such as PowerShell and PsExec and Impacket for lateral movement. Relies on PDQ Deployer for both lateral movement across the network and payload delivery (such as Medusa ransomware). Modify Windows Firewall policy to enable Remote Desktop Protocol (RDP) to deliver malicious payloads to other devices. Perform a credential dump using Impacket and Mimikatz. Configure Microsoft Defender Antivirus exclusions to avoid blocking ransomware payloads. Bandizip and Rclone are used for data collection and extraction, respectively.

The larger implication here is that RMM tools such as AnyDesk, Atera, MeshAgent, ConnectWise ScreenConnect, and SimpleHelp are becoming dual-use infrastructure for covert operations, as threat actors can mix malicious traffic into a trusted, encrypted platform to reduce the likelihood of detection.


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticlePutting science at the center of health
Next Article How IH-MIE is accelerating hydrogen mobility across Europe

Related Posts

Flowise AI Agent Builder under active CVSS 10.0 RCE exploitation. Over 12,000 instances exposed

April 7, 2026

Iran-linked password dissemination campaign targets more than 300 Israeli Microsoft 365 organizations

April 6, 2026

North Korea-linked hackers use GitHub as C2 in multi-stage attack targeting South Korea

April 6, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Artemis II sets human spaceflight record with historic lunar flyby

How IH-MIE is accelerating hydrogen mobility across Europe

China-linked Storm-1175 exploits zero-day to rapidly deploy Medusa ransomware

Putting science at the center of health

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.