China-Linked Storm-1175 Exploits Zero-Days to Rapidly Deploy Medusa Ransomware
嗯,用户让我帮忙总结一篇文章的内容,控制在一百个字以内,而且不需要用“文章内容总结”之类的开头。首先,我需要仔细阅读这篇文章,抓住主要信息。 文章讲的是一个来自中国的威胁行为者,使用Medusa勒索软件,并结合零日漏洞和N日漏洞进行快速攻击。他们主要攻击医疗、教育、金融等行业的互联网系统,影响了澳大利亚、英国和美国的组织。微软的威胁情报团队提到了这些攻击利用了多个漏洞,并且在某些情况下是在漏洞公开之前就进行了利用。 接下来,我需要把这些信息浓缩到100字以内。要确保涵盖主要点:威胁行为者、使用的工具、攻击目标、影响范围以及利用的漏洞情况。 可能的结构是:来自中国的威胁行为者利用零日和N日漏洞快速攻击医疗、教育、金融等行业的系统,影响多国组织,并利用多个漏洞进行入侵和部署勒索软件。 检查一下字数,确保不超过限制。同时,避免使用复杂的术语,让总结更易懂。 </think> 中国威胁行为者利用零日和N日漏洞快速攻击医疗、教育、金融等行业的互联网系统,影响澳大利亚、英国和美国的组织,并通过多个漏洞部署Medusa勒索软件。 2026-4-7 06:35:0 Author: thehackernews.com(查看原文) 阅读量:7 收藏

Vulnerability / Threat Intelligence

A China-based threat actor known for deploying Medusa ransomware has been linked to the weaponization of a combination of zero-day and N-day vulnerabilities to orchestrate "high-velocity" attacks and break into susceptible internet-facing systems.

"The threat actor's high operational tempo and proficiency in identifying exposed perimeter assets have proven successful, with recent intrusions heavily impacting healthcare organizations, as well as those in the education, professional services, and finance sectors in Australia, the United Kingdom, and the United States," the Microsoft Threat Intelligence team said.

Attacks mounted by Storm-1175 have also leveraged zero-day exploits, in some cases, before they have been publicly disclosed, as well as recently disclosed vulnerabilities to obtain initial access. Select incidents have involved the threat actor chaining together multiple exploits (e.g., OWASSRF) for post-compromise activity.

Upon gaining a foothold, the financially motivated cybercriminal actor swiftly moves to exfiltrate data and deploy Medusa ransomware within a span of a few days, or, in select incidents, within 24 hours.

To aid in these efforts, the group creates persistence by creating new user accounts, deploying web shells or legitimate remote monitoring and management (RMM) software for lateral movement, conducting credential theft, and interfering with the normal functioning of security solutions, before dropping the ransomware.

Since 2023, Storm-1175 has been linked to the exploitation of more than 16 vulnerabilities -

Both CVE-2025-10035 and CVE-2026-23760 are said to have been exploited as zero-days prior to them being publicly disclosed.As of late 2024, the hacking crew has exhibited a flair for targeting Linux systems, including exploiting vulnerable Oracle WebLogic instances across several organizations. However, the exact vulnerability that was being weaponized in these attacks remains unknown.

"Storm-1175 rotates exploits quickly during the time between disclosure and patch availability or adoption, taking advantage of the period where many organizations remain unprotected," Microsoft said.

Some of the notable tactics observed in these attacks are as follows -

  • Using living-off-the-land binaries (LOLBins), including PowerShell and PsExec, along with Impacket for lateral movement.
  • Relying on PDQ Deployer for both lateral movement and payload delivery, including Medusa ransomware, across the network.
  • Modifying Windows Firewall policies to enable Remote Desktop Protocol (RDP) and deliver malicious payloads to other devices.
  • Carrying out credential dumping using Impacket and Mimikatz.
  • Configuring Microsoft Defender Antivirus exclusions to prevent it from blocking ransomware payloads.
  • Leveraging Bandizip and Rclone for data collection and exfiltration, respectively.

The bigger implication here is that RMM tools like AnyDesk, Atera, MeshAgent, ConnectWise ScreenConnect, or SimpleHelp are becoming dual-use infrastructure for covert operations, as they allow threat actors to blend malicious traffic into trusted, encrypted platforms and reduce the likelihood of detection.

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2026/04/china-linked-storm-1175-exploits-zero.html
如有侵权请联系:admin#unsafe.sh