Skip to main content
Threat IntelligenceApril 13, 20269 min read

Threat Intelligence Roundup: Storm-1175 Medusa Campaign, CPUID Supply Chain Attack, and Adobe Emergency Patch

Threat Intelligence Roundup: Storm-1175 Medusa Campaign, CPUID Supply Chain Attack, and Adobe Emergency Patch

Threat Intelligence Bulletin: Three significant developments landed this week. A China-linked threat actor called Storm-1175 is deploying Medusa ransomware within 24 hours of zero-day exploitation, with recent intrusions hitting healthcare, finance, and professional services. Developer tool provider CPUID had its website compromised for 19 hours, serving STX RAT through trojanized CPU-Z and HWMonitor downloads. Adobe released an emergency patch for an actively exploited critical RCE in Acrobat Reader. This roundup covers what happened, what it signals, and how it connects to the compliance and advisory work Z Cyber does.

Three advisories in 72 hours is not a slow week. It is a test of whether your security program can triage at the speed the threat environment now demands. The question is not just what happened but how long it takes your organization to determine which of these applies to you and who owns the response.

Storm-1175: Medusa Ransomware at Machine Speed

Microsoft's Security Blog published detailed technical analysis on April 6 documenting Storm-1175, a financially motivated threat actor linked to China, that has been running high-velocity Medusa ransomware campaigns against internet-facing systems across the US, UK, and Australia. The reporting has continued to generate significant coverage through this weekend as additional victims and technical indicators have surfaced.

The defining characteristic of Storm-1175 is speed. The group exploited CVE-2026-23760 in SmarterMail and CVE-2025-10035 in GoAnywhere Managed File Transfer within approximately one week of public disclosure in each case. In some intrusions, the complete sequence from initial access to data exfiltration and ransomware deployment was completed within 24 hours. That operational tempo is not a vulnerability in your detection tools. It is a vulnerability in the governance layer: the time it takes to decide who patches what, when, and with what priority.

The sectors most heavily impacted in recent Storm-1175 intrusions are healthcare, education, professional services, and finance. These are precisely the sectors that carry the highest regulatory compliance obligations: HIPAA in healthcare, SOC 2 and financial services frameworks in finance, and increasingly CMMC for any organization with defense supply chain relationships. A ransomware incident in any of these sectors does not just create an operational crisis. It creates a regulatory reporting obligation and, in many cases, a breach notification timeline measured in days.

The attack methodology after initial access is consistent: Storm-1175 creates new user accounts, deploys web shells or legitimate remote monitoring and management tools for lateral movement, conducts credential theft, and disables or interferes with security tooling before dropping the ransomware payload. This sequence makes early detection critical. By the time ransomware is executing, the attacker has already been in the environment long enough to establish persistence and exfiltrate data.

The governance question this story raises is not technical. It is whether your security program has the asset inventory depth to immediately identify which internet-facing systems run SmarterMail, GoAnywhere MFT, or similar web-facing applications, and whether your patching process has a clear escalation path for actively exploited vulnerabilities that bypasses standard change management timelines. We explored this pattern in depth in our analysis of machine-speed threats and the governance layer organizations need to respond to them. The technology to detect these events exists. The governance structures to act on that detection at the required speed often do not.

Is your security program built to respond at the speed of active exploitation?

Z Cyber maps your asset inventory, patching accountability, and escalation processes to what the current threat environment actually requires.

Book a Demo →

CPUID Supply Chain Attack: Developer Tools as Entry Points

On April 9, 2026 at approximately 15:00 UTC, unknown threat actors compromised CPUID's website. CPU-Z, HWMonitor, HWMonitor Pro, and PerfMonitor are among the most widely used hardware monitoring tools in the world, particularly among IT and security professionals. For approximately 19 hours, the download links for CPU-Z and HWMonitor were replaced with links to malicious executables. The incident ended around April 10 at 10:00 UTC when CPUID identified and remediated the compromise.

The malicious executables deployed STX RAT, a remote access trojan with HVNC capabilities and broad infostealer functionality. The command-and-control infrastructure used in this campaign had been previously associated with trojanized FileZilla installers, suggesting an organized threat actor with an established malware distribution operation rather than an opportunistic compromise. CPUID confirmed the breach, attributing it to a compromise of a secondary API that caused the main site to serve malicious download links. Kaspersky identified more than 150 victims, including organizations in retail, manufacturing, consulting, telecommunications, and agriculture.

This is the third significant developer or IT tool supply chain event in five weeks, following the Axios npm supply chain compromise in March 2026 and the Smart Slider 3 WordPress attack in early April. The pattern is worth naming directly: the trust relationship between developers or IT professionals and the tools they use daily is being systematically exploited as an initial access vector. CPU-Z is not a consumer application. It is a tool used by IT administrators, security engineers, and system builders to inspect hardware. Compromise of an IT professional's workstation is a high-value target precisely because those machines often have elevated permissions, access to management consoles, and credentials for critical systems.

The supply chain risk question for mid-market security programs is not whether to trust software vendors. It is whether your security program has visibility into which developer and IT tools are in use across your environment, who downloaded them and when, and whether those downloads came from official sources. This is the kind of shadow IT inventory challenge that a managed advisory program addresses systematically rather than reactively.

Anyone who downloaded CPU-Z or HWMonitor between April 9 at 15:00 UTC and April 10 at 10:00 UTC should treat those systems as potentially compromised pending investigation. The STX RAT payload conducts anti-sandbox checks before executing, which means automated sandboxing may not flag the initial download as malicious. Behavioral monitoring and endpoint detection are the relevant controls here.

Adobe Acrobat Emergency Patch: CVE-2026-34621

Adobe released emergency updates on April 12 to address CVE-2026-34621, a critical vulnerability in Acrobat Reader with a CVSS score of 8.6 that is under active exploitation in the wild. Adobe confirmed exploitation is occurring before the patch was available, meaning this was a zero-day at the time it was being used.

Acrobat Reader's near-universal deployment across enterprise environments makes this advisory relevant to virtually every organization regardless of industry. PDF-based attacks have been a persistent vector precisely because Acrobat Reader sits on nearly every managed endpoint and is trusted implicitly by end users who receive PDF attachments as a routine part of business communication. Active exploitation of an Acrobat Reader vulnerability typically involves malicious PDF files distributed via phishing or document sharing, which means the entry point is the human element rather than an exposed network service.

The patch is available now. The prioritization question is how your organization handles emergency patches outside standard change management cycles for an application as widely deployed as Acrobat Reader. This is the same governance question the Storm-1175 story raises, applied to a different class of vulnerability: do you have a process for accelerating patching when active exploitation is confirmed, or does every patch go through the same queue regardless of exploitation status?

Three critical advisories in one week. Is your program built to triage them?

Z Cyber builds the asset inventory, accountability structures, and escalation processes that make rapid response possible.

Talk to an Advisor →

The Governance Pattern Across All Three Stories

Three separate stories this week, three different attack vectors, but the same underlying governance question in each case: how long does it take your organization to determine what applies to you and who owns the response?

Storm-1175 exploiting internet-facing systems within days of vulnerability disclosure is a test of your asset inventory and your patch escalation process. The CPUID supply chain attack is a test of whether your security program has visibility into which IT tools are in use and where they came from. Adobe CVE-2026-34621 is a test of whether your emergency patch process can move faster than active exploitation campaigns are moving.

The organizations that answered all three questions well this week share common characteristics. They have a current, queryable asset inventory that tells them immediately which systems run vulnerable software. They have clear accountability structures that specify who owns the patching decision for each system category. And they have escalation processes that bring active exploitation signals to security leadership within hours rather than days.

These are the foundational elements that the NIST CSF 2.0 framework codifies in its Identify and Respond functions. They are also the elements that regulatory frameworks like HIPAA, SOC 2, and CMMC assume you have in place when they require documented incident response and vulnerability management programs. The frameworks do not specify how fast you patch. They specify that you have a process. The threat environment this week is specifying how fast that process needs to work.

If your program does not yet have those foundational structures, the Cyber Blueprint is where Z Cyber starts when building a framework-aligned security program from the ground up. The three stories this week are a useful benchmark: could your current program have answered the asset, accountability, and escalation questions for each of them within a business day? That is the standard the threat environment is now setting.

Related Resources

Frequently Asked Questions

What is Storm-1175 and why is it dangerous to mid-market companies?

Storm-1175 is a China-linked, financially motivated threat actor that deploys Medusa ransomware against internet-facing systems. What makes Storm-1175 particularly dangerous is its operational speed: the group exploits vulnerabilities within days or even within 24 hours of public disclosure, before most organizations have patched. Healthcare, education, professional services, and finance sectors in the US, UK, and Australia have all been targeted in recent months. Mid-market companies are attractive targets precisely because they often lack dedicated threat intelligence teams to triage advisories at the speed required.

What happened in the CPUID CPU-Z supply chain attack?

On April 9-10, 2026, unknown threat actors compromised CPUID's website, which hosts popular hardware monitoring tools including CPU-Z and HWMonitor. For approximately 19 hours, download links were replaced with links to malicious executables that deployed STX RAT, a remote access trojan with HVNC and broad infostealer capabilities. CPUID confirmed the breach. Over 150 victims were identified, including organizations in retail, manufacturing, consulting, and telecommunications. Anyone who downloaded CPU-Z or HWMonitor between April 9 at 15:00 UTC and April 10 at 10:00 UTC should treat those systems as potentially compromised.

What is CVE-2026-34621 in Adobe Acrobat?

CVE-2026-34621 is a critical remote code execution vulnerability in Adobe Acrobat Reader with a CVSS score of 8.6. Adobe released an emergency patch on April 12, 2026 after confirming active exploitation in the wild. Because Acrobat Reader is ubiquitous across enterprise environments, this vulnerability has a very broad potential attack surface. Organizations should prioritize patching Acrobat Reader across managed endpoints and treat any unpatched systems as elevated risk.

How does Storm-1175 gain initial access so quickly?

Storm-1175 exploits vulnerabilities in internet-facing systems, particularly web-facing applications and email platforms, before organizations apply patches. In recent intrusions, the group exploited CVE-2026-23760 in SmarterMail and CVE-2025-10035 in GoAnywhere Managed File Transfer within one week of public disclosure. After gaining access, Storm-1175 creates new user accounts, deploys web shells or legitimate remote monitoring tools for lateral movement, conducts credential theft, and then deploys Medusa ransomware. The entire sequence from initial access to ransomware deployment has been observed in under 24 hours.

What governance controls help organizations respond faster to zero-day threats?

The organizations that respond fastest to zero-day threats share three governance characteristics: a current asset inventory that allows them to immediately identify which systems run vulnerable software, clear accountability structures that specify who owns the patching decision for each system category, and an escalation process that brings active exploitation signals directly to security leadership rather than waiting in a standard patch queue. Framework-aligned programs built on NIST CSF or similar standards embed these structures into normal operations rather than treating them as emergency procedures. Without them, even well-resourced security teams lose days to coordination overhead when a high-severity advisory lands.

Subscribe for Updates

Get cybersecurity insights delivered to your inbox.