IT

Medusa Ransomware Group Accelerates Attacks with New Exploits

The China-based Storm-1175 group is executing rapid ransomware attacks, leveraging newly disclosed vulnerabilities to breach systems and deploy Medusa ransomware. The group primarily targets healthcare, education, finance, and services sectors.
GL
Aryan Mehta
thegreylens.com
Medusa Ransomware Group Accelerates Attacks with New Exploits

A sophisticated and rapidly advancing threat actor, identified as Storm-1175 and operating from China, is escalating its cybercrime activities by exploiting newly disclosed vulnerabilities before they can be patched by organizations. This actor is employing a strategy of "living off the land," utilizing legitimate system tools like PowerShell and PsExec, alongside Cloudflare tunnels and Remote Desktop Protocol (RDP), to move laterally within compromised networks. Their modus operandi involves chaining exploits, establishing persistence through new accounts, and weakening security defenses by modifying antivirus settings.

Microsoft has reported that Storm-1175 exhibits a high operational tempo, often moving from initial network access to data exfiltration and ransomware deployment within a mere 24-hour window. This speed is facilitated by their proficiency in identifying and exploiting exposed perimeter assets and a willingness to weaponize zero-day and N-day vulnerabilities almost immediately after their disclosure. The group's primary targets include critical sectors such as healthcare, education, finance, and professional services, with attacks observed across Australia, the United Kingdom, and the United States.

Medusa ransomware, a ransomware-as-a-service (RaaS) operation active since June 2021, has been the payload of choice for Storm-1175. The group engages in double extortion tactics, stealing data before encrypting it, thereby increasing pressure on victims to pay ransoms. Their technical capabilities include using tools like Impacket and Mimikatz for credential harvesting, targeting LSASS and enabling WDigest caching to capture passwords. After achieving administrative access, they can pivot to domain controllers to access Active Directory and sensitive system data.

The urgency and effectiveness of Storm-1175's attacks are underscored by their ability to deploy ransomware in as little as one day. Security experts recommend that organizations continuously inventory and monitor both internal and external systems to identify exploitable assets and reduce their attack surface. The group's consistent exploitation of vulnerabilities in platforms such as Microsoft Exchange, Ivanti, ConnectWise, and JetBrains highlights the ongoing need for prompt patching and robust security posture management.

---

⚠️ This article used AI assistance. Please verify facts independently.

This article was researched and written with AI assistance based on publicly available news sources. All content is reviewed for accuracy by The GreyLens editorial team. For corrections or feedback: news@thegreylens.com

← Back to News