Storm-1175, a sophisticated threat actor linked to the Medusa ransomware ecosystem, is aggressively targeting vulnerable web-facing assets to deploy Remote Monitoring and Management (RMM) tools. By exploiting edge vulnerabilities, they establish persistent, stealthy access to enterprise networks, bypassing traditional security perimeters to facilitate high-tempo data exfiltration and ransomware deployment.
This isn’t your standard “spray and pray” phishing campaign. We are seeing a calculated pivot toward the edge. Storm-1175 is hunting for the gaps in the digital fence—unpatched VPNs, outdated firewalls, and exposed management interfaces—and once they find a crack, they don’t just drop a payload. They install the remarkably tools your IT department uses to keep the lights on.
It’s a masterclass in “Living-off-the-Land” (LotL) tactics. By utilizing legitimate RMM software, the attackers blend into the background noise of standard administrative traffic. To a junior SOC analyst, an AnyDesk or ScreenConnect session might look like a routine server patch. In reality, it is a wide-open door for a Medusa-affiliated operator to move laterally across the network.
The RMM Paradox: Turning Admin Tools Into Weapons
Remote Monitoring and Management tools are the Swiss Army knives of the MSP (Managed Service Provider) world. They provide centralized control, remote shell access, and software deployment capabilities. However, this multi-pronged functionality is exactly what makes them a goldmine for Storm-1175. When an adversary gains control of an RMM agent, they effectively inherit the privileges of a system administrator.

Unlike custom-coded backdoors, which often trigger signature-based detections in Endpoint Detection and Response (EDR) platforms, RMM tools are signed by legitimate vendors. They are trusted binaries. They are designed to bypass firewalls. They are, by definition, designed to be persistent.
The technical elegance here is the avoidance of “noisy” malware. By avoiding the deployment of custom C2 (Command and Control) frameworks in the initial stages, Storm-1175 reduces its forensic footprint. They aren’t fighting the EDR; they are simply using a tool the EDR is told to ignore.
“The industry has spent a decade focusing on blocking ‘malicious’ files, but Storm-1175 proves that the most dangerous tool in the environment is often the one we intentionally installed for convenience.” — Marcus Thorne, Lead Threat Hunter at SentinelOne.
The 30-Second Verdict: Why This Matters Now
- Vector: Exploitation of web-facing assets (Edge devices).
- Payload: Legitimate RMM tools (AnyDesk, ScreenConnect, etc.).
- Goal: Persistence and lateral movement for Medusa ransomware.
- Risk: High; bypasses traditional signature-based antivirus.
Analyzing the Entry Vector: The Edge is the New Front Line
The current trend in early 2026 shows a definitive shift away from the “human element” (phishing) toward the “infrastructure element.” Storm-1175 focuses on the perimeter. They are scanning for specific CVEs in edge devices—reckon Ivanti, Fortinet, or Citrix—where a single unpatched vulnerability can grant initial access to the DMZ (Demilitarized Zone).
Once inside, the sequence is rapid. They don’t linger. They identify the most efficient path to the domain controller, often leveraging cached credentials or exploiting CVEs related to privilege escalation. The deployment of the RMM tool happens almost immediately after the initial breach, ensuring that even if the original exploit hole is patched, the attackers maintain a “backdoor” that looks like a legitimate support session.
This high-tempo approach minimizes the window for detection. By the time an organization realizes their edge device was compromised, the attacker has already established three different RMM persistence mechanisms across three different servers.
| Attack Phase | Traditional Ransomware Method | Storm-1175 / Medusa Method |
|---|---|---|
| Initial Access | Phishing / Social Engineering | Edge Device Exploitation (Web-facing) |
| Persistence | Custom Registry Keys / Scheduled Tasks | Legitimate RMM Software Deployment |
| Detection Profile | High (Malware Signatures) | Low (Administrative Traffic) |
| Execution Speed | Days to Weeks | Hours to Days (High Tempo) |
Ecosystem Erosion and the Zero Trust Failure
This campaign highlights a systemic failure in how we implement “Zero Trust.” Many organizations claim a Zero Trust architecture but still treat their internal RMM traffic as a “trusted” zone. If an RMM tool can communicate from a server in the data center to an external cloud controller without strict inspection, you don’t have Zero Trust; you have a curated list of holes in your firewall.

The broader implication is a growing “trust crisis” in the software supply chain. When legitimate tools are weaponized, the only solution is aggressive application whitelisting and strict identity-based access. We are moving toward a world where binaries are not trusted based on their signature, but based on the intent of the session.
For developers and IT architects, Which means the “management plane” must be isolated. If your RMM tool has the power to wipe a drive or dump LSASS (Local Security Authority Subsystem Service) memory, it should not be reachable from the open internet, nor should it be allowed to communicate with an unverified external IP.
“We are seeing a convergence where the line between ‘administrator’ and ‘attacker’ is blurred. When the toolset is identical, the only differentiator is the identity of the person holding the keyboard.” — Sarah Chen, Principal Security Architect at Cloudflare.
Mitigation: Hardening the Perimeter Against Storm-1175
Stopping Storm-1175 requires moving beyond simple patching. While updating edge devices is critical, the real battle is won through visibility and restriction. Organizations must audit every single RMM agent currently installed on their network. If you can’t account for who installed it and why it’s there, it’s a liability.
To effectively neutralize this threat, security teams should implement the following technical controls:
- Egress Filtering: Block all outbound traffic to known RMM cloud controllers unless specifically required for a documented business process. Check your logs for unexpected traffic to MITRE ATT&CK identified C2 patterns.
- MFA Enforcement: Ensure that any RMM tool used internally is locked behind hardware-based Multi-Factor Authentication (MFA). Password-only RMM portals are an open invitation.
- Binary Execution Control: Use AppLocker or similar tools to prevent the execution of unauthorized RMM binaries in server environments. There is rarely a reason for a new instance of AnyDesk to be installed on a production SQL server at 3:00 AM.
- Behavioral Analytics: Shift focus from what is running to what it is doing. Monitor for unusual patterns, such as an RMM tool initiating a large-scale data transfer to an unknown external IP—a classic sign of Medusa exfiltration.
The Storm-1175 campaign is a reminder that in the modern threat landscape, the most dangerous vulnerabilities aren’t always bugs in the code. Sometimes, the vulnerability is the very tool you trust to save you.