Medusa Ransomware Affiliate Storm‑1175 Deploys Zero‑Day Exploits Across Healthcare, Education, Finance Sectors
What Happened — Microsoft attributes a surge of high‑velocity attacks to Storm‑1175, a China‑based group that runs the Medusa ransomware affiliate. The gang has been weaponising both n‑day and zero‑day vulnerabilities—sometimes within 24 hours of discovery—and chaining multiple exploits to gain persistence before encrypting data. Recent campaigns have hit healthcare providers, universities, professional‑services firms, and financial institutions in Australia, the United Kingdom, and the United States.
Why It Matters for TPRM —
- The rapid weaponisation of zero‑days shows a threat actor with access to exploit brokers, raising the likelihood of supply‑chain compromise for third‑party vendors.
- Multi‑product targeting (GoAnywhere MFT, SmarterMail, Microsoft Exchange, etc.) expands the attack surface across many SaaS and on‑premises solutions that organisations may rely on.
- Early‑stage data exfiltration and credential theft precede ransomware, increasing the risk of downstream breaches of partner data.
Who Is Affected — Healthcare, Education, Professional Services, Financial Services; vendors of Managed File Transfer, Email/Collaboration, Identity & Access Management, and remote‑monitoring tools.
Recommended Actions —
- Review contracts and security controls for any third‑party services that use the listed vulnerable products.
- Verify that vendors have rapid patch‑management processes and can provide evidence of zero‑day mitigation (e.g., virtual patching, application‑allow‑list).
- Implement multi‑factor authentication and least‑privilege account provisioning to limit credential‑theft impact.
Technical Notes — Storm‑1175 leveraged CVE‑2025‑10035 (GoAnywhere MFT), CVE‑2026‑23760 (SmarterMail authentication bypass), and a suite of 16 other CVEs across Microsoft Exchange, Papercut, Ivanti, ConnectWise, JetBrains TeamCity, SimpleHelp, CrushFTP, and BeyondTrust. Attack vectors included vulnerability exploitation, credential theft, creation of rogue user accounts, and disabling of security tools before ransomware deployment. Source: BleepingComputer