Medusa Ransomware Attack
What is the Attack? Microsoft Threat Intelligence has identified Storm-1175, a financially motivated threat actor conducting high-tempo ransomware operations leveraging the Medusa ransomware variant. The group specializes in rapidly exploiting vulnerable web-facing systems, often weaponizing newly disclosed vulnerabilities (N-days) and even zero-days before public disclosure. Storm-1175 | Medusa ransomware operations | Microsoft Security Blog A…
|
What is the Attack? |
Microsoft Threat Intelligence has identified Storm-1175, a financially motivated threat actor conducting high-tempo ransomware operations leveraging the Medusa ransomware variant. The group specializes in rapidly exploiting vulnerable web-facing systems, often weaponizing newly disclosed vulnerabilities (N-days) and even zero-days before public disclosure. A defining characteristic of this campaign is speed; attackers can move from initial access to full ransomware deployment within 24 hours, significantly reducing detection and response windows. • Observed targeting includes: • Primary regions impacted: |
|
What is the recommended Mitigation? |
• Patch immediately: Prioritize newly disclosed vulnerabilities affecting internet-facing systems |
|
What FortiGuard Coverage is available? |
• FortiGuard IPS Service: Detects and blocks exploit attempts targeting vulnerable web-facing assets. |
