Back to Feed
RansomwareApr 7, 2026

Medusa Ransomware Fast to Exploit Vulnerabilities, Breached Systems

Medusa ransomware group exploits zero-days and fresh vulnerabilities to breach 300+ organizations within days.

Summary

The Medusa ransomware group (tracked as Storm-1175 by Microsoft) has rapidly compromised over 300 critical infrastructure organizations since June 2021, exploiting at least 16 known vulnerabilities and three zero-days in systems like Microsoft Exchange, PaperCut, and GoAnywhere MFT. The group operates at high speed, moving from initial access to data exfiltration and encryption within hours or days, weaponizing newly disclosed vulnerabilities almost immediately. Recent targets span healthcare, education, finance, and professional services sectors across Australia, the UK, and the US, with the group employing double extortion tactics alongside advanced persistence and lateral movement techniques.

Full text

The Medusa ransomware group has been operating at a fast pace, seizing short windows of opportunity in attacks across multiple verticals, Microsoft says. Operating as a ransomware-as-a-service (RaaS), Medusa has been active since June 2021 and hit over 300 organizations in the critical infrastructure sector by February 2025. The group is known for engaging in double extortion, stealing victims’ data in addition to encrypting it, as well as for relying on phishing and the exploitation of unpatched vulnerabilities for initial access. In recent attacks, Medusa’s operators, tracked by Microsoft as Storm-1175, were seen moving rapidly from initial access to post-compromise operations, often within days or, in some cases, hours. Additionally, the group was seen quickly weaponizing newly disclosed vulnerabilities, as well as exploiting zero-day bugs in web-facing systems. “The threat actor’s high operational tempo and proficiency in identifying exposed perimeter assets have proven successful, with recent intrusions heavily impacting healthcare organizations, as well as those in the education, professional services, and finance sectors in Australia, the United Kingdom, and the United States,” Microsoft says.Advertisement. Scroll to continue reading. Over the past three years, Medusa’s operators have exploited at least 16 vulnerabilities in Microsoft Exchange, Papercut, Ivanti Connect Secure and Policy Secure, ConnectWise ScreenConnect, JetBrains TeamCity, SimpleHelp, SAP NetWeaver, CrushFTP, GoAnywhere MFT, SmarterMail, and BeyondTrust. Storm-1175, Microsoft says, weaponizes newly disclosed vulnerabilities immediately. It was seen exploiting the NetWeaver bug one day after it was publicly disclosed on April 24, 2025. The group was also seen chaining multiple security defects to obtain remote code execution (RCE) on the victims’ systems. It has also targeted Linux systems, including Oracle WebLogic instances. According to Microsoft, the group has exploited at least three zero-day flaws, including CVE-2026-23760 (SmarterMail) and CVE-2025-10035 (GoAnywhere MFT). In some cases, Storm-1175 exploited the flaws seven days before public disclosure. Following initial access, the gang typically deploys a web shell or remote access payload and proceeds to data exfiltration and the execution of file-encrypting ransomware within one day. During this window, Storm-1175 establishes persistence, performs reconnaissance and lateral movement, modifies firewall settings to enable remote access, and exfiltrates credentials. “We have also observed that after gaining administrator credentials, Storm-1175 has used a script to recover passwords from Veeam backup software, which is used to connect to remote hosts, therefore enabling ransomware deployment to additional connected systems,” Microsoft notes. The hackers have been using living-off-the-land binaries such as PowerShell and PsExec, along with Cloudflare tunnels, Remote Desktop Protocol (RDP), various remote monitoring and management (RMM) tools, PDQ Deployer for payload execution, Impacket and Mimikatz for lateral movement and credential harvesting, and Bandizip and Rclone for data collection and exfiltration. In light of Microsoft’s report, Tuskira co-founder and CEO Piyush Sharma and AttackIQ field CISO Pete Luban urge at-risk organizations to continuously inventory and monitor both internal and external systems to identify exploitable assets and reduce risks. “The heightened speed and efficiency of these campaigns is a game-changer for organizations with high-pressure environments like hospitals, insurers, and banks, which is who Storm-1175 is primarily targeting. These organizations already have little tolerance for downtime, complex edge infrastructure, and a constant patching backlog, so a threat actor that can spot exposed assets and exploit them before defenders catch up has a much wider lane than it did even a year ago,” Sharma said. Luban commented, “If unchecked, the impact is bigger than a single encrypted network segment. Medusa is built for double extortion, so the ransom threat is not just downtime, it’s the risk of public data exposure and downstream fallout like regulatory penalties, partner distrust, and long tail fraud from stolen data.” Related: German Police Unmask REvil Ransomware Leader Related: Stolen Logins Are Fueling Everything From Ransomware to Nation-State Cyberattacks Related: Cisco Firewall Vulnerability Exploited as Zero-Day in Interlock Ransomware Attacks Related: Medusa Ransomware Uses Malicious Driver to Disable Security Tools Written By Ionut Arghire Ionut Arghire is an international correspondent for SecurityWeek. More from Ionut Arghire European Commission Confirms Data Breach Linked to Trivy Supply Chain AttackTrueConf Zero-Day Exploited in Asian Government AttacksCritical ShareFile Flaws Lead to Unauthenticated RCEReact2Shell Exploited in Large-Scale Credential Harvesting CampaignNorth Korean Hackers Drain $285 Million From Drift in 10 SecondsCisco Patches Critical and High-Severity Vulnerabilities250,000 Affected by Data Breach at Nacogdoches Memorial HospitalMercor Hit by LiteLLM Supply Chain Attack Latest News GPUBreach: Root Shell Access Achieved via GPU Rowhammer Attack German Police Unmask REvil Ransomware LeaderWhite House Seeks to Slash CISA Funding by $707 MillionWynn Resorts Says 21,000 Employees Affected by ShinyHunters HackGoogle DeepMind Researchers Map Web Attacks Against AI AgentsGuardarian Users Targeted With Malicious Strapi NPM PackagesNorth Korean Hackers Target High-Profile Node.js MaintainersFortinet Rushes Emergency Fixes for Exploited Zero-Day Trending Daily Briefing Newsletter Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts. Webinar: Securing Fragile OT in an Exposed World March 10, 2026 Get a candid look at the current OT threat landscape as we move past "doom and gloom" to discuss the mechanics of modern OT exposure. Register Webinar: Why Automated Pentesting Alone Is Not Enough April 7, 2026 Join our live diagnostic session to expose hidden coverage gaps and shift from flawed tool-level evaluations to a comprehensive, program-level validation discipline. Register People on the MoveScott Goree has been appointed Senior Vice President of Channel and Alliances at Delinea.Kai has named Nick Degnan as Chief Revenue Officer.Joe Sullivan has been appointed Strategic Advisor at cloud security firm Upwind.More People On The MoveExpert Insights The Next Cybersecurity Crisis Isn’t Breaches—It’s Data You Can’t Trust Data integrity shouldn’t be seen only through the prism of a technical concern but also as a leadership issue. (Steve Durbin) Why Agentic AI Systems Need Better Governance – Lessons from OpenClaw Agentic AI platforms are shifting from passive recommendation tools to autonomous action-takers with real system access, (Etay Maor) The Human IOC: Why Security Professionals Struggle with Social Vetting Applying SOC-level rigor to the rumors, politics, and 'human intel' can make or break a security team. (Joshua Goldfarb) How to 10x Your Vulnerability Management Program in the Agentic Era The evolution of vulnerability management in the agentic era is characterized by continuous telemetry, contextual prioritization and the ultimate goal of agentic remediation. (Nadir Izrael) SIM Swaps Expose a Critical Flaw in Identity Security SIM swap attacks exploit misplaced trust in phone numbers and human processes to bypass authentication controls and seize high-value accounts. (Torsten George) Flipboard Reddit Whatsapp Whatsapp Email

Indicators of Compromise

  • cve — CVE-2026-23760
  • cve — CVE-2025-10035
  • malware — Medusa ransomware

Entities

Medusa / Storm-1175 (threat_actor)Microsoft (vendor)Microsoft Exchange (product)PaperCut (product)GoAnywhere MFT (product)JetBrains TeamCity (product)