A new cybersecurity report has revealed a serious threat involving a China-linked hacking group known as Storm-1175. This group is actively carrying out ransomware attacks by taking advantage of both zero-day and known vulnerabilities. Their main goal is to break into systems quickly and deploy Medusa ransomware in a very short time. The attacks are carefully planned and executed with high precision. This makes them a major concern for organizations worldwide.

Storm-1175 mainly targets systems that are exposed to the internet, especially those that have security weaknesses. These attackers look for vulnerabilities that are either newly discovered or already known but not yet fixed. Zero-day vulnerabilities are particularly dangerous because they are unknown and do not have a patch available. At the same time, they also exploit N-day vulnerabilities that organizations have failed to update. This combination increases their chances of successful attacks.
Once the attackers find a vulnerable system, they move very fast to gain control. They first enter the system and then start exploring the network to understand its structure. During this phase, they often collect important and sensitive data from the system. After that, they prepare the environment for launching the ransomware attack. All of this can happen within a very short time frame.
What makes this campaign especially dangerous is the speed at which everything happens. In some cases, the entire attack process has been completed within just 24 hours. Security researchers describe these attacks as high-velocity operations because of their rapid execution. The attackers do not waste time and move quickly from one step to another. This leaves very little time for security teams to detect and respond.
The primary focus of Storm-1175 is on internet-facing systems such as web servers and applications. These systems are directly accessible from the internet, making them easy targets if not secured properly. Many organizations delay applying security updates, which creates a window of opportunity. Attackers take advantage of these delays to exploit system weaknesses. This is why unpatched systems are at a higher risk.
After gaining access to a system, the attackers deploy Medusa ransomware to lock it down. This ransomware encrypts files and prevents users from accessing their data. The attackers then demand a ransom in exchange for restoring access to the system. In many cases, they also steal data before encryption to increase pressure. This allows them to threaten victims with data leaks if payment is not made.
This campaign is considered highly dangerous because it combines advanced techniques with fast execution. The use of both zero-day and known vulnerabilities makes it difficult to defend against. Even systems that are partially secure can still be targeted using unknown flaws. The reduced response time also makes traditional security measures less effective. This increases the overall impact of the attack.
This situation shows a clear shift in how cyberattacks are being carried out today. Attackers are now focusing not only on techniques but also on speed. Storm-1175 is a strong example of how quickly attackers can exploit weaknesses. Organizations must act fast by applying updates and monitoring systems regularly. Staying alert and proactive is the only way to reduce the risk of such attacks.
Stay alert, and keep your security measures updated!
Source: Follow cybersecurity88 on X and LinkedIn for the latest cybersecurity news


