Microsoft Links Storm‑1175 Hackers

Microsoft Links Storm‑1175 Hackers

Explore how Microsoft connects cybercriminals to a significant ransomware exploit impacting organizations worldwide.

Understanding Storm‑1175 Group

Understanding Storm‑1175 Group

Storm‑1175 is a cybercriminal group known for its sophisticated ransomware attacks targeting major infrastructure.

GoAnywhere MFT Vulnerability

GoAnywhere MFT Vulnerability

Learn about the critical flaw in GoAnywhere MFT that has made organizations vulnerable to cyber threats.

CVE‑2025‑10035 Explained

CVE‑2025‑10035 Explained

CVE‑2025‑10035 is a deserialization bug allowing unauthorized command injection leading to major exploits.

Patch Updates Available

Patch Updates Available

GoAnywhere released patches in versions 7.8.4 and 7.6.3 to fix the reported vulnerabilities.

Attack Timeline

Attack Timeline

Exploitation began on September 10, 2025, impacting various organizations and prompting urgent defenses.

Persistent Attack Techniques

Persistent Attack Techniques

Attackers used SimpleHelp and MeshAgent to maintain control over compromised systems and facilitate access.

Intrusion Methods Overview

Intrusion Methods Overview

The attack involved system discovery, lateral movement, and command and control through Cloudflare tunnels.

Data Exfiltration Tactics

Data Exfiltration Tactics

Rclone was identified in victim environments, showing methods for data extraction during the attack.

Medusa Ransomware Deployed

Medusa Ransomware Deployed

The campaign culminated in the deployment of Medusa ransomware, locking down affected networks.

Criticism of Transparency Issues

Criticism of Transparency Issues

Experts criticize Fortra for not being transparent about the vulnerabilities and delays in communication.

Staying Cyber Aware

Staying Cyber Aware

Understanding these attacks helps promote digital security awareness and preparedness across all organizations.