Medusa Ransomware Group Exploits Zero-Day Vulnerabilities Within 24 Hours of the Breach

Published
Written by:
Lore Apostol
Lore Apostol
Cybersecurity Writer
Key Takeaways
  • Rapid attack execution: The Medusa ransomware group transitions from initial network access to data exfiltration and payload deployment within 24 hours.
  • Zero-days targeted: Notably, the actors actively exploited CVE-2026-23760 in SmarterMail and CVE-2025-10035 in GoAnywhere MFT days before public disclosure.
  • Cybersecurity risks escalate: These accelerated attacks heavily impact critical infrastructure, including healthcare facilities and municipal governments across the U.S.

Recent analysis by Microsoft cybersecurity researchers reveals a concerning escalation in the operational tempo of the Storm-1175 group, known for Medusa ransomware deployment. This highly proficient threat syndicate is actively weaponizing zero-day vulnerabilities to compromise web-facing perimeters, drastically reducing the defense window for enterprise network administrators.

Exploiting Zero-Day Vulnerabilities

The Medusa ransomware group demonstrates a sophisticated ability to identify and exploit vulnerabilities days before patches are widely available. Remarkably, this group can execute full data exfiltration and deploy encryption payloads within 24 hours of the initial breach, Microsoft has warned

Upon gaining initial access, the attackers immediately create unauthorized user accounts to ensure persistence. They subsequently leverage legitimate remote management software, including ConnectWise ScreenConnect, AnyDesk, and SimpleHelp, to navigate the compromised environment.

Storm-1175 attack chain | Source: Microsoft
Storm-1175 attack chain | Source: Microsoft

Since 2023, Microsoft Threat Intelligence has observed exploitation of over 16 vulnerabilities, including:

Escalating Global Cybersecurity Risks

The Medusa syndicate, believed to operate out of Russia due to its avoidance of Commonwealth of Independent States targets and its use of Cyrillic script, systematically targets critical infrastructure.

To mitigate these advanced threats, organizations must maintain rigorous visibility over their internet-facing assets and implement strict access controls to prevent rapid lateral movement within their networks.

Recent ransomware attacks attributed to this group have crippled significant entities, including the University of Mississippi Medical Center and Passaic County in New Jersey, as well as other healthcare institutions. Last month, a Bell Ambulance breach that exposed data of almost 240,000 patients was claimed by Medusa.


For a better user experience we recommend using a more modern browser. We support the latest version of the following browsers: For a better user experience we recommend using the latest version of the following browsers: