PULSE NAME
Storm-1175 focuses gaze on vulnerable web-facing assets in high ...
WHITE Storm-1175 AlienVault 2026-04-06 Modified: 2026-04-06
26
IOCs
MEDIUM VOLUME
The financially motivated cybercriminal actor tracked by Microsoft Threat Intelligence as Storm-1175 operates high-velocity ransomware campaigns that weaponize N-days, targeting vulnerable, web-facing systems during the window between vulnerability disclosure and widespread patch adoption. Following successful exploitation, Storm-1175 rapidly moves from initial access to data exfiltration and deployment of Medusa ransomware, often within a few days and, in some cases, within 24 hours. The threat actor’s high operational tempo and proficiency in identifying exposed perimeter assets have proven successful, with recent intrusions heavily impacting healthcare organizations, as well as those in the education, professional services, and finance sectors in Australia, United Kingdom, and United States.
MITRE ATT&CK & Malware Families
MALWARE FAMILIES
Medusa
Indicators of Compromise (17 / 26 total)
All CVE FileHash-MD5 FileHash-SHA1 FileHash-SHA256 IPv4
TYPEINDICATORDESCRIPTIONCREATED
CVE CVE-2023-21529 2026-04-06
CVE CVE-2023-27350 2026-04-06
CVE CVE-2023-27351 2026-04-06
CVE CVE-2023-46805 2026-04-06
CVE CVE-2024-1708 2026-04-06
CVE CVE-2024-1709 2026-04-06
CVE CVE-2024-21887 2026-04-06
CVE CVE-2024-27198 2026-04-06
CVE CVE-2024-27199 2026-04-06
CVE CVE-2024-57726 2026-04-06
CVE CVE-2024-57727 2026-04-06
CVE CVE-2024-57728 2026-04-06
CVE CVE-2025-10035 2026-04-06
CVE CVE-2025-31324 2026-04-06
CVE CVE-2025-52691 2026-04-06
CVE CVE-2026-1731 2026-04-06
CVE CVE-2026-23760 2026-04-06