PULSE NAME
Storm-1175 focuses gaze on vulnerable web-facing assets in high ...
WHITE Storm-1175 AlienVault 2026-04-06 Modified: 2026-04-06
26
IOCs
MEDIUM VOLUME
The financially motivated cybercriminal actor tracked by Microsoft Threat Intelligence as Storm-1175 operates high-velocity ransomware campaigns that weaponize N-days, targeting vulnerable, web-facing systems during the window between vulnerability disclosure and widespread patch adoption. Following successful exploitation, Storm-1175 rapidly moves from initial access to data exfiltration and deployment of Medusa ransomware, often within a few days and, in some cases, within 24 hours. The threat actor’s high operational tempo and proficiency in identifying exposed perimeter assets have proven successful, with recent intrusions heavily impacting healthcare organizations, as well as those in the education, professional services, and finance sectors in Australia, United Kingdom, and United States.
MITRE ATT&CK & Malware Families
MALWARE FAMILIES
Medusa
Indicators of Compromise (1 / 26 total)
All CVE FileHash-MD5 FileHash-SHA1 FileHash-SHA256 IPv4
TYPEINDICATORDESCRIPTIONCREATED
FileHash-SHA1 211500fa181ee200bf9bdd42a1ab0288a7f0cf69 2026-04-06