
Lightning-Fast Ransomware Breaches
Storm-1175 is a Chinese cybercriminal group behind Medusa ransomware. The gang strikes with unprecedented speed, chaining exploits and breaching networks within hours or days. In fact, it often weaponizes a newly disclosed vulnerability within 24 hours of disclosure. These lightning-fast breaches have hit critical sectors around the world.
Recent intrusions heavily impacted healthcare, education, finance, and professional services in Australia, the UK, and the United States. In one case, a breach went from initial access to ransomware deployment in under 24 hours.
Exploiting Zero-Day and N-Day Vulnerabilities
The collection of exploits developed by Storm-1175 includes conventional “patchless” (n-day) vulnerabilities and genuine zero-day exploits. This includes a critical vulnerability in Fortra GoAnywhere MFT (CVE-2025-10035), which Storm-1175 used prior to its patching to gain network access. The use of an undisclosed SmarterTools SmarterMail authentication bypass exploit (CVE-2026-23760) also indicates that the threat actor employs zero-day attacks.
However, the vast majority of attacks attributed to Storm-1175 make use of vulnerabilities disclosed relatively recently. From 2023 to date,
- Microsoft Exchange: On-premise mail servers (Multiple CVEs).
- Fortra GoAnywhere MFT: Managed file transfer server.
- SmarterTools SmarterMail: Email/collaboration server.
- JetBrains TeamCity: CI/CD server.
- Remote management software: ConnectWise ScreenConnect, SimpleHelp, and other.
Each one of these vulnerabilities was utilized by the group to gain control over their victims very quickly sometimes even in a couple of days after being discovered publicly.
Rapid Attack Chains and Techniques
The Storm-1175 modus operandi moves through stages that are fast and sequential in nature. Typically, in an attack,
- Initial Access: Compromise the target network using a vulnerable internet facing application (such as file sharing and email servers).
- Persistence: Use web shell scripts or legit remote management tools (such as Simple Help, or Mesh Agent) for persistence.
- Lateral Movement: Gain credentials and leverage legitimate tools (such as PowerShell, PsExec, or RDP) to traverse the network.
- Data Exfiltration: Steal valuable data (usually cloud tunneling techniques or Rclone).
- Payload Delivery: Disable any anti-virus or backup software in place, before unleashing the Medusa ransomware on the victim’s files.
Clearly, this pace reflects how sophisticated such attacks can be. Report says, a typical Storm-1175 attack completes all these stages within just 24 hours.
Medusa RaaS and Global Impact
Medusa functions as a Ransomware-as-a-Service (RaaS), where affiliates conduct the attacks. Globally, more than 300 critical infrastructure organizations (hospitals, utilities, governmental services) have fallen prey to the group since 2021.
U.S. officials reported that energy, water, health care, and other essential services are among those targeted by Medusa, numbering in the hundreds. The attack involves a “double extortion” technique, whereby the group obtains sensitive information and threatens to release it unless a ransom is paid.
- Double Extortion: Victims’ information is encrypted and stolen, compelling them to pay money to prevent exposure.
- Public Leak Sites: Names of victims are published on a website hosted on the Tor network, with stolen information and ransom demands.
- High Ransom Payments: Affiliates reportedly receive up to $1 million per incident.
- Geographic Spread: Sectors affected include health care, energy, finance, and education in the USA, UK, Australia, India, and elsewhere.
Conclusion: When Zero-Day Speed Meets Ransomware Scale
Storm-1175 shows how modern ransomware operations win, not through patience, but through velocity. This group chains zero-day and newly disclosed vulnerabilities into rapid attack paths, then moves from initial access to Medusa deployment in less than 24 hours. By the time many defenders begin triage, the attacker is already at persistence, credential theft, lateral movement, exfiltration, and final impact.
Why This Threat Matters Now
This is not a one-off campaign. It is a repeatable operating model built for pressure and scale.
- Internet-facing applications become the entry point
- Legitimate tools like PowerShell, PsExec, and RDP accelerate movement inside the network
- AV tampering and backup disruption reduce recovery options
- Double extortion raises the cost of every minute lost
Where Xcitium Changes the Outcome
For organizations using Xcitium Advanced EDR, this attack does not succeed.
Unknown payloads are intercepted the moment they execute.
Encryption routines cannot touch real systems or data.
Code can run without being able to cause damage.
The attack chain collapses before Medusa can turn access into extortion.
Stop the Attack Before the Clock Starts
Storm-1175 proves that patching alone cannot keep pace with adversaries who weaponize disclosure in hours. Security has to remove the attacker’s ability to cause harm at execution.
Protect critical infrastructure before the next exploit wave becomes a ransom event.