Fast-moving Storm-1175 uses new exploits to breach networks and drop Medusa
好的,我现在需要帮用户总结这篇文章的内容,控制在100字以内。首先,我得通读整篇文章,抓住主要信息。 文章讲的是一个名为Storm-1175的中国威胁行为者,他们利用快速行动和新的漏洞来实施勒索软件攻击。他们主要针对医疗、教育、金融等行业的机构,目标是美国、英国和澳大利亚。攻击手法包括利用零日漏洞、横向移动、窃取凭证以及部署Medusa勒索软件。 接下来,我需要把这些关键点浓缩到100字以内。要确保涵盖攻击者是谁、他们的目标、使用的手段以及结果。 可能的结构是:Storm-1175利用新漏洞快速攻击,目标行业和地区,使用的技术和最终部署的勒索软件。 现在开始组织语言: “中国威胁行为者Storm-1175利用新漏洞快速实施勒索软件攻击,主要针对医疗、教育、金融等行业及美国、英国和澳大利亚地区。通过零日漏洞、横向移动和凭证窃取等技术,在24小时内部署Medusa勒索软件。” 检查一下字数是否在限制内,并确保信息准确无误。 </think> 中国威胁行为者Storm-1175利用新漏洞快速实施勒索软件攻击,主要针对医疗、教育、金融等行业及美国、英国和澳大利亚地区。通过零日漏洞、横向移动和凭证窃取等技术,在24小时内部署Medusa勒索软件。 2026-4-7 13:20:50 Author: securityaffairs.com(查看原文) 阅读量:18 收藏

Fast-moving Storm-1175 uses new exploits to breach networks and drop Medusa

China-based actor Storm-1175 runs fast ransomware attacks, exploiting new flaws to breach systems and quickly deploy Medusa ransomware.

China-based actor Storm-1175 carries out fast, financially driven ransomware attacks by exploiting newly disclosed vulnerabilities before organizations patch them. The group targets exposed systems and quickly moves from initial access to data theft and Medusa ransomware deployment, sometimes within 24 hours. The financially motivated group mainly targets sectors such as healthcare, education, finance, and services across the US, UK, and Australia. The attackers often chain exploits, create new accounts for persistence, move laterally using remote tools, steal credentials, and weaken security defenses. Their speed and focus on unpatched systems make them highly effective.

Microsoft researchers report that Storm-1175 quickly exploits newly disclosed flaws in web-facing systems to gain access. Since 2023, the group has targeted many platforms, including Microsoft Exchange, Ivanti, ConnectWise, JetBrains, and others. It often weaponizes vulnerabilities within days, or even one day, before organizations apply patches.

“Storm-1175 rapidly weaponizes recently disclosed vulnerabilities to obtain initial access.” reads the report published by Microsoft. “Since 2023, Microsoft Threat Intelligence has observed exploitation of over 16 vulnerabilities, including:

The attackers also chain multiple exploits to achieve deeper access, such as remote code execution, and have targeted both Windows and Linux systems. In some cases, the threat actor used zero-days even before public disclosure, showing advanced capabilities. By focusing on unpatched systems and acting fast, Storm-1175 maximizes impact and maintains a strong advantage over defenders.

Storm-1175 chains multiple exploits to gain deeper access, as seen in attacks on Microsoft Exchange where it moved from initial access to remote code execution. The group also targets Linux systems and has used zero-day flaws before public disclosure, showing advanced skills.

After gaining access, it installs web shells or remote tools, creates admin accounts, and moves laterally using tools like PowerShell, PsExec, RDP, and Cloudflare tunnels. It also abuses legitimate RMM tools and software like PDQ Deployer and Impacket to spread across networks. The attackers can deploy ransomware in as little as one day, highlighting their speed and efficiency.

Storm-1175 steals credentials using tools like Impacket and Mimikatz, targeting LSASS and enabling WDigest caching to capture passwords. After gaining admin access, it extracts credentials from backups and pivots to domain controllers to access Active Directory and system data.

The group weakens security by modifying antivirus settings and adding exclusions to let ransomware run undetected. It then steals data using tools like Rclone and compresses files for exfiltration.

“Storm-1175 modifies the Microsoft Defender Antivirus settings stored in the registry to tamper with the antivirus software and prevent it from blocking ransomware payloads; in order to accomplish this, an attacker must have access to highly privileged accounts that can modify the registry directly.” continues the report. “For this reason, prioritizing alerts related to credential theft activity, which typically indicate an active attacker in the environment, is essential to responding to ransomware signals and preventing attackers from gaining privileged account access.”

Finally, it deploys Medusa ransomware across the network using tools like PDQ Deployer or Group Policy, completing the attack.

Microsoft provided Indicators of compromise (IoCs) for these attacks along with mitigation and protection guidance.

Follow me on Twitter: @securityaffairs and Facebook and Mastodon

Pierluigi Paganini

(SecurityAffairs – hacking, Storm-1175)




文章来源: https://securityaffairs.com/190440/cyber-crime/fast-moving-storm-1175-uses-new-exploits-to-breach-networks-and-drop-medusa.html
如有侵权请联系:admin#unsafe.sh