Attention: You are using an outdated browser, device or you do not have the latest version of JavaScript downloaded and so this website may not work as expected. Please download the latest software or switch device to avoid further issues.

News > Attacks & Threats > Storm-1175 Deploys Medusa Ransomware at 'High Velocity'

Storm-1175 Deploys Medusa Ransomware at 'High Velocity'

Microsoft says the financially motivated cybercrime group has exploited N-day and zero-day vulnerabilities in campaigns predicated on speed.

Storm-1175 actors are running up-tempo campaigns to deliver Medusa ransomware, putting pressure on organizations to patch critical vulnerabilities faster. 

In a blog post on Monday, Microsoft Threat Intelligence detailed how Storm-1175, a financially motivated cybercrime group, is conducting "high velocity ransomware campaigns" that typically exploit known vulnerabilities in the sweet spot for threat actors: the time between a vulnerability's initial disclosure and the widespread adoption of the patch. Microsoft also tied the exploitation of several zero-day vulnerabilities to the group. More here

Similar Stories

Cisco found and fixed a significant vulnerability in the way Anthropic handles memories, but experts warn that mishandled memory files will continue to threaten AI systems. More...

AI's danger isn't that it's creating new bugs, it's that it's amplifying old ones. More...

The prompt-injection vulnerability in the agentic AI product for filesystem operations was a sanitization issue that all… More...

Chained Bypasses Exfiltrate Data Via Hidden AI Prompts More...

Attackers can abuse the near-maximum severity flaw in nginx-ui to restart, create, modify, and delete NGINX configuratio… More...

Have your say

 

News Categories

Cisco found and fixed a significant vulnerability in the way Anthropic handles memories, but experts warn that mishandled memory files will continue to threaten AI systems. More...

AI's danger isn't that it's creating new bugs, it's that it's amplifying old ones. More...

The prompt-injection vulnerability in the agentic AI product for filesystem operations was a sanitization issue that all… More...

Chained Bypasses Exfiltrate Data Via Hidden AI Prompts More...

Attackers can abuse the near-maximum severity flaw in nginx-ui to restart, create, modify, and delete NGINX configuratio… More...

image

Contact Us

Security Interest Group Switzerland
c/o Bridge Head AG
Sulzbergstrasse 34
5430 Wettingen
Switzerland

Follow Us

This website is powered by
ToucanTech