PULSE NAME
Storm-1175 focuses gaze on vulnerable web-facing assets in high ...
WHITE Storm-1175 AlienVault 2026-04-06 Modified: 2026-04-06
26
IOCs
MEDIUM VOLUME
The financially motivated cybercriminal actor tracked by Microsoft Threat Intelligence as Storm-1175 operates high-velocity ransomware campaigns that weaponize N-days, targeting vulnerable, web-facing systems during the window between vulnerability disclosure and widespread patch adoption. Following successful exploitation, Storm-1175 rapidly moves from initial access to data exfiltration and deployment of Medusa ransomware, often within a few days and, in some cases, within 24 hours. The threat actor’s high operational tempo and proficiency in identifying exposed perimeter assets have proven successful, with recent intrusions heavily impacting healthcare organizations, as well as those in the education, professional services, and finance sectors in Australia, United Kingdom, and United States.
MITRE ATT&CK & Malware Families
MALWARE FAMILIES
Medusa
Indicators of Compromise (4 / 26 total)
All CVE FileHash-MD5 FileHash-SHA1 FileHash-SHA256 IPv4
TYPEINDICATORDESCRIPTIONCREATED
FileHash-SHA256 0cefeb6210b7103fd32b996beff518c9b6e1691a97bb1cda7f5fb57905c4be96 2026-04-06
FileHash-SHA256 5ba7de7d5115789b952d9b1c6cff440c9128f438de933ff9044a68fff8496d19 2026-04-06
FileHash-SHA256 9632d7e4a87ec12fdd05ed3532f7564526016b78972b2cd49a610354d672523c 2026-04-06
FileHash-SHA256 e57ba1a4e323094ca9d747bfb3304bd12f3ea3be5e2ee785a3e656c3ab1e8086 2026-04-06