2026 Futuriom 50: Highlights →Explore

Executive Summary

In early April 2026, the China-based cybercriminal group Storm-1175 executed a series of high-velocity attacks targeting vulnerable internet-facing systems across sectors such as healthcare, education, professional services, and finance in Australia, the United Kingdom, and the United States. By exploiting a combination of zero-day and N-day vulnerabilities, including CVE-2025-10035 in Fortra's GoAnywhere MFT and CVE-2026-23760 in SmarterMail, the group rapidly gained initial access. Post-compromise activities involved deploying web shells, creating new user accounts, and utilizing remote monitoring and management tools like SimpleHelp and MeshAgent for persistence and lateral movement. Within as little as 24 hours, Storm-1175 exfiltrated data and deployed Medusa ransomware, leading to significant operational disruptions for the affected organizations. (microsoft.com)

This incident underscores the increasing sophistication and speed of financially motivated threat actors in exploiting newly disclosed vulnerabilities. The rapid transition from initial access to ransomware deployment highlights the critical need for organizations to promptly apply security patches, monitor for unauthorized activities, and implement robust incident response strategies to mitigate such high-tempo cyber threats.

Why This Matters Now

The rapid exploitation of zero-day vulnerabilities by groups like Storm-1175 emphasizes the urgent need for organizations to enhance their vulnerability management and incident response capabilities. The ability of threat actors to move from initial access to full ransomware deployment within 24 hours poses a significant risk to operational continuity and data security.

Attack Path Analysis

Related CVEs

MITRE ATT&CK® Techniques

Potential Compliance Exposure

Sector Implications

Sources

Frequently Asked Questions

Storm-1175 exploited multiple vulnerabilities, including CVE-2025-10035 in Fortra's GoAnywhere MFT and CVE-2026-23760 in SmarterMail, to gain initial access to target systems.

Cloud Native Security Fabric Mitigations and ControlsCNSF

Aviatrix Zero Trust CNSF is pertinent to this incident as it could likely limit the attacker's ability to move laterally, escalate privileges, and exfiltrate data by enforcing strict segmentation and identity-aware policies.

Initial Compromise

Control: Cloud Native Security Fabric (CNSF)

Mitigation: The attacker's initial access may have been constrained by limiting exposure of internet-facing systems through identity-aware policies.

Privilege Escalation

Control: Zero Trust Segmentation

Mitigation: The creation of unauthorized user accounts and deployment of web shells could likely be restricted by enforcing strict identity-based access controls.

Lateral Movement

Control: East-West Traffic Security

Mitigation: Lateral movement using tools like PowerShell and PsExec would likely be constrained by enforcing strict east-west traffic controls.

Command & Control

Control: Multicloud Visibility & Control

Mitigation: The use of remote monitoring and management software for command and control may have been limited by providing comprehensive visibility and control over multicloud environments.

Exfiltration

Control: Egress Security & Policy Enforcement

Mitigation: Data exfiltration using tools like Rclone would likely be constrained by enforcing strict egress policies.

Impact (Mitigations)

The deployment of Medusa ransomware to encrypt data and disrupt operations may have been limited by reducing the attacker's ability to move laterally and escalate privileges.

Impact at a Glance

Affected Business Functions

  • Email Services
  • File Transfer Operations
  • Remote Access Management
Operational Disruption

Estimated downtime: 14 days

Financial Impact

Estimated loss: $500,000

Data Exposure

Sensitive corporate data, including emails and transferred files, potentially exposed.

Recommended Actions

  • Implement Zero Trust Segmentation to limit lateral movement and enforce least privilege access.
  • Deploy East-West Traffic Security controls to monitor and restrict internal traffic flows.
  • Utilize Egress Security & Policy Enforcement to control outbound traffic and prevent data exfiltration.
  • Enhance Threat Detection & Anomaly Response capabilities to identify and respond to malicious activities promptly.
  • Regularly update and patch systems to mitigate vulnerabilities exploited by attackers.

Secure the Paths Between Cloud Workloads

A cloud-native security fabric that enforces Zero Trust across workload communication—reducing attack paths, compliance risk, and operational complexity.

Cta pattren Image