Apr 07, 2026 • [email protected] (The Hacker News)
China-Linked Storm-1175 Exploits Zero-Days to Rapidly Deploy Medusa Ransomware
China-linked threat actor Storm-1175 has been observed exploiting a combination of zero-day and N-day vulnerabilities to conduct high-velocity attacks...
Executive Summary
China-linked threat actor Storm-1175 has been observed exploiting a combination of zero-day and N-day vulnerabilities to conduct high-velocity attacks targeting internet-facing systems. The group deploys Medusa ransomware following initial compromise. Storm-1175 demonstrates sophisticated operational capabilities, including rapid identification of exposed perimeter assets and proficiency in vulnerability weaponization. Organizations should prioritize immediate patching of internet-facing systems, implement network segmentation, and maintain robust backup strategies to mitigate ransomware risks. Continuous monitoring for Indicators of Compromise (IOCs) and threat intelligence sharing are recommended given the advanced nature of this threat actor.
Summary
A China-based threat actor known for deploying Medusa ransomware has been linked to the weaponization of a combination of zero-day and N-day vulnerabilities to orchestrate "high-velocity" attacks and break into susceptible internet-facing systems. "The threat actor's high operational tempo and proficiency in identifying exposed perimeter assets have proven successful, with recent
Published Analysis
China-linked threat actor Storm-1175 has been observed exploiting a combination of zero-day and N-day vulnerabilities to conduct high-velocity attacks targeting internet-facing systems. The group deploys Medusa ransomware following initial compromise. Storm-1175 demonstrates sophisticated operational capabilities, including rapid identification of exposed perimeter assets and proficiency in vulnerability weaponization. Organizations should prioritize immediate patching of internet-facing systems, implement network segmentation, and maintain robust backup strategies to mitigate ransomware risks. Continuous monitoring for Indicators of Compromise (IOCs) and threat intelligence sharing are recommended given the advanced nature of this threat actor. A China-based threat actor known for deploying Medusa ransomware has been linked to the weaponization of a combination of zero-day and N-day vulnerabilities to orchestrate "high-velocity" attacks and break into susceptible internet-facing systems. "The threat actor's high operational tempo and proficiency in identifying exposed perimeter assets have proven successful, with recent A China-based threat actor known for deploying Medusa ransomware has been linked to the weaponization of a combination of zero-day and N-day vulnerabilities to orchestrate "high-velocity" attacks and break into susceptible internet-facing systems. "The threat actor's high operational tempo and proficiency in identifying exposed perimeter assets have proven successful, with recent
Linked Entities
- Medusa Ransomware
- Storm-1175