Storm-1175 focuses gaze on vulnerable web-facing assets in high ...
The financially motivated cybercriminal actor tracked by Microsoft Threat Intelligence as Storm-1175 operates high-velocity ransomware campaigns that weaponize N-days, targeting vulnerable, web-facing systems during the window between vulnerability disclosure and widespread patch adoption. Following successful exploitation, Storm-1175 rapidly moves from initial access to data exfiltration and deployment of Medusa ransomware, often within a few days and, in some cases, within 24 hours. The threat actor’s high operational tempo and proficiency in identifying exposed perimeter assets have proven successful, with recent intrusions heavily impacting healthcare organizations, as well as those in the education, professional services, and finance sectors in Australia, United Kingdom, and United States.
Pulse ID: 69d41711b3984d53ffc4f8ce
Pulse Link: https://otx.alienvault.com/pulse/69d41711b3984d53ffc4f8ce
Pulse Author: AlienVault
Created: 2026-04-06 20:26:57
Be advised, this data is unverified and should be considered preliminary. Always do further verification.
#Australia #CyberSecurity #Education #Healthcare #InfoSec #Microsoft #OTX #OpenThreatExchange #RAT #RansomWare #UnitedKingdom #UnitedStates #Vulnerability #bot #AlienVault









