{"id":45152,"date":"2026-04-06T23:51:24","date_gmt":"2026-04-06T15:51:24","guid":{"rendered":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/04\/06\/microsoft-links-medusa-ransomware-affiliate-to-zero-day-attacks\/"},"modified":"2026-04-06T23:51:24","modified_gmt":"2026-04-06T15:51:24","slug":"microsoft-links-medusa-ransomware-affiliate-to-zero-day-attacks","status":"publish","type":"post","link":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/04\/06\/microsoft-links-medusa-ransomware-affiliate-to-zero-day-attacks\/","title":{"rendered":"Microsoft links Medusa ransomware affiliate to zero-day attacks"},"content":{"rendered":"\n<p style=\"text-align:center\"><img loading=\"lazy\" decoding=\"async\" height=\"900\" src=\"https:\/\/www.bleepstatic.com\/content\/hl-images\/2025\/03\/12\/Medusa_headpic.jpg\" width=\"1600\" alt=\"Microsoft links Medusa ransomware affiliate to zero-day attacks\"><\/p>\n<p>Microsoft says that Storm-1175, a China-based financially motivated cybercriminal group known for deploying Medusa ransomware payloads, has been deploying n-day and zero-day exploits in high-velocity attacks.<\/p>\n<p>This cybercrime gang quickly shifts to targeting new security vulnerabilities to gain access to its victims&#8217; networks, weaponizing some of them within a day and, in some cases, exploiting them a week before patches are released.<\/p>\n<p>&#8220;Storm-1175 rapidly moves from initial access to data exfiltration and deployment of Medusa ransomware, often within a few days and, in some cases, within 24 hours,&#8221; <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2026\/04\/06\/storm-1175-focuses-gaze-on-vulnerable-web-facing-assets-in-high-tempo-medusa-ransomware-operations\/\" target=\"_blank\" rel=\"nofollow noopener\">Microsoft said<\/a>.<\/p>\n<p>&#8220;The threat actor&#8217;s high operational tempo and proficiency in identifying exposed perimeter assets have proven successful, with recent intrusions heavily impacting healthcare organizations, as well as those in the education, professional services, and finance sectors in Australia, United Kingdom, and United States.&#8221;<\/p>\n<p>Microsoft has also observed Storm-1175 operators chaining multiple exploits to gain persistence on compromised systems by creating new user accounts, deploying remote monitoring and management software, stealing credentials, and disabling security software before dropping ransomware payloads.<\/p>\n<div style=\"text-align:center\">\n<figure style=\"display:inline-block\"><img loading=\"lazy\" decoding=\"async\" height=\"343\" src=\"https:\/\/www.bleepstatic.com\/images\/news\/u\/1109292\/2026\/Storm-1175-attack-chain.webp\" width=\"700\" alt=\"Microsoft links Medusa ransomware affiliate to zero-day attacks\"><figcaption><em>Storm-1175 attack chain (Microsoft)<\/em><\/figcaption><\/figure>\n<\/div>\n<p>In October, Microsoft reported that <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/microsoft-critical-goanywhere-bug-exploited-in-ransomware-attacks\/\" target=\"_blank\" rel=\"nofollow noopener\">Storm-1175 had been exploiting<\/a> a maximum-severity GoAnywhere MFT vulnerability (<a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-10035\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-10035<\/a>) in Medusa ransomware attacks for over one week before it was patched.<\/p>\n<p>Another vulnerability Storm-1175 exploited as a zero-day was <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2026-23760\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2026-23760<\/a>, an <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/smartermail-auth-bypass-flaw-now-exploited-to-hijack-admin-accounts\/\" target=\"_blank\" rel=\"nofollow noopener\">authentication bypass in SmarterTools&#8217; SmarterMail<\/a> email server and collaboration tool.<\/p>\n<p>&#8220;While these more recent attacks demonstrate an evolved development capability or new access to resources like exploit brokers for Storm-1175, it is worth noting that GoAnywhere MFT has previously been targeted by ransomware attackers, and that the SmarterMail vulnerability was reportedly similar to a previously disclosed flaw,&#8221; Microsoft added.<\/p>\n<p>&#8220;These factors may have helped to facilitate subsequent zero-day exploitation activity by Storm-1175, who still primarily leverages N-day vulnerabilities.&#8221;<\/p>\n<p>&#8203;In recent campaigns, Storm-1175 has exploited more than 16 vulnerabilities across 10 software products, including Microsoft Exchange (<a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2023-21529\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2023-21529<\/a>), Papercut (<a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2023-27351\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2023-27351<\/a> and <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2023-27350\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2023-27350<\/a>), Ivanti Connect Secure and Policy Secure (<a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2023-46805\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2023-46805<\/a> and <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-21887\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2024-21887<\/a>), and ConnectWise ScreenConnect (<a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-1709\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2024-1709<\/a> and <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-1708\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2024-1708<\/a>).<\/p>\n<p>Microsoft has also seen them exploit vulnerabilities in JetBrains TeamCity (<a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-27198\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2024-27198<\/a> and <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-27199\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2024-27199<\/a>), SimpleHelp (<a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-57726\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2024-57726<\/a>, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-57727\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2024-57727<\/a>, and <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-57728\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2024-57728<\/a>), CrushFTP (<a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-31161\" target=\"_blank\" rel=\"nofollow noopener\">CVE&#8209;2025&#8209;31161<\/a>), SmarterMail (<a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-52691\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-52691<\/a>), and BeyondTrust (<a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2026-1731\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2026-1731<\/a>).<\/p>\n<p>CISA issued a joint advisory with the FBI and the Multi-State Information Sharing and Analysis Center (MS-ISAC) in March 2025, warning that the Medusa ransomware gang&#8217;s attacks <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/cisa-medusa-ransomware-hit-over-300-critical-infrastructure-orgs\/\" target=\"_blank\" rel=\"nofollow noopener\">had impacted over 300 critical infrastructure organizations<\/a> across the United States.<\/p>\n<p>In July 2024, Microsoft also linked the Storm-1175 threat group, along with three other cybercrime gangs, to Black Basta and Akira ransomware attacks that <a href=\"https:\/\/www.bleepingcomputer.com\/news\/microsoft\/microsoft-ransomware-gangs-exploit-vmware-esxi-auth-bypass-in-attacks\/\" target=\"_blank\" rel=\"nofollow noopener\">exploited a VMware ESXi authentication-bypass flaw<\/a>.<\/p>\n<style> .ia_ad {     background-color: #f0f6ff;     width: 95%;     max-width: 800px;     margin: 15px auto;     border-radius: 8px;     border: 1px solid #d6ddee;     display: flex;     align-items: stretch;     padding: 0;     overflow: hidden; }  .ia_lef {     flex: 1;     max-width: 200px;     height: auto;     display: flex;     align-items: stretch; }  .ia_lef a {     display: flex;     width: 100%;     height: 100%; }   .ia_lef a img {     width: 100%;     height: 100%;          border-radius: 8px 0 0 8px;     margin: 0;     display: block; }  .ia_rig {     flex: 2;     padding: 10px;     display: flex;     flex-direction: column;     justify-content: center; }  .ia_rig h2 {     font-size: 17px !important;     font-weight: 700;     color: #333;     line-height: 1.4;     font-family: Georgia, \"Times New Roman\", Times, serif;     margin: 0 0 14px 0; }  .ia_rig p {     font-weight: bold;     font-size: 14px;     margin: 0 0 clamp(6px, 2vw, 14px) 0; }  .ia_button {     background-color: #FFF;     border: 1px solid #3b59aa;     color: black;     text-align: center;     text-decoration: none;     border-radius: 8px;     display: inline-block;     font-size: 16px;     font-weight: bold;     cursor: pointer;     padding: 10px 20px;     width: fit-content; }  .ia_button a {     text-decoration: none;     color: inherit;     display: block; }  @media (max-width: 600px) {     .ia_ad {         flex-direction: column;         align-items: center;     }      .ia_lef {         max-width: 100%;     }      .ia_lef a img {         border-radius: 8px 8px 0 0;     }       .ia_rig {         padding: 15px;         width: 100%;     }      .ia_button {         width: 100%; \tmargin: 0px auto;     } } <\/style>\n<div>\n<div>         <a href=\"https:\/\/hubs.li\/Q048zztN0\" target=\"_blank\" rel=\"noopener sponsored\">             <img decoding=\"async\" src=\"https:\/\/www.bleepstatic.com\/c\/p\/picus-whitepaper.jpg\" alt=\"Microsoft links Medusa ransomware affiliate to zero-day attacks\">         <\/a>     <\/div>\n<div>\n<h2><a href=\"https:\/\/hubs.li\/Q048zztN0\" target=\"_blank\" rel=\"noopener sponsored\">Automated Pentesting Covers Only 1 of 6 Surfaces.<\/a><\/h2>\n<p>Automated pentesting proves the path exists. BAS proves whether your controls stop it. Most teams run one without the other.<\/p>\n<p>This whitepaper maps six validation surfaces, shows where coverage ends, and provides practitioners with three diagnostic questions for any tool evaluation.<\/p>\n<p>           <button><a href=\"https:\/\/hubs.li\/Q048zztN0\" target=\"_blank\" rel=\"noopener sponsored\">Get Your Copy Now<\/a><\/button>     <\/div>\n<\/p><\/div>\n<div>\n<h3>Related Articles:<\/h3>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/russian-man-sentenced-for-operating-botnet-used-in-ransomware-attacks\/\">Manager of botnet used in ransomware attacks gets 2 years in prison<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/yanluowang-ransomware-access-broker-gets-81-months-in-prison\/\">Yanluowang ransomware access broker gets 81 months in prison<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/police-sinkholes-45-000-ip-addresses-in-cybercrime-crackdown\/\">Police sinkholes 45,000 IP addresses in cybercrime crackdown<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/legal\/interpol-operation-synergia-takes-down-1-300-servers-used-for-cybercrime\/\">Interpol operation Synergia takes down 1,300 servers used for cybercrime<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/phobos-ransomware-admin-pleads-guilty-to-wire-fraud-conspiracy\/\">Phobos ransomware admin pleads guilty to wire fraud conspiracy<\/a><\/p>\n<\/p><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Microsoft says that Storm-1175, a China-based financial [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[28],"tags":[],"class_list":["post-45152","post","type-post","status-publish","format-standard","hentry","category--bleepingcomputer"],"_links":{"self":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/45152","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/comments?post=45152"}],"version-history":[{"count":0,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/45152\/revisions"}],"wp:attachment":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/media?parent=45152"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/categories?post=45152"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/tags?post=45152"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}