Originally published at https://monstermegs.com/blog/web-server-ransomware-attack/
One of the most actively exploited threats against internet-facing servers right now is a web server ransomware attack campaign operated by a group Microsoft Threat Intelligence tracks as Storm-1175. On April 6, 2026, Microsoft published detailed findings showing how Storm-1175 is systematically targeting organisations through unpatched vulnerabilities in web-facing applications, deploying Medusa ransomware – and in some documented cases, moving from initial access to full encryption in under 24 hours. Healthcare providers, schools, financial services firms, and professional services organisations in Australia, the United Kingdom, and the United States have all been affected.
What gives this web server ransomware attack campaign its edge is timing. Storm-1175 monitors vulnerability disclosures and moves to exploit them before most administrators have applied patches – and in some cases before public disclosure has even occurred. The group demonstrated capability with at least three zero-day vulnerabilities in 2026 alone, meaning it is not waiting for public knowledge to begin its operations. It is often already inside target systems by the time defenders learn a flaw exists.
Running parallel to Storm-1175's campaign, a critical unauthenticated access flaw in a popular nginx management tool – CVE-2026-33032, nicknamed MCPwn – added another high-severity entry point to the threat landscape in late March 2026. Together, these incidents illustrate where web infrastructure risk is concentrated right now and what organisations need to address before they become the next target.
How Storm-1175 Launches a Web Server Ransomware Attack
The mechanics of a Storm-1175 web server ransomware attack follow a consistent playbook. First, the group scans the internet for systems running vulnerable software – mail servers, managed file transfer platforms, and other applications with public-facing interfaces. When a new vulnerability appears, Storm-1175 moves quickly, often exploiting it within one week of disclosure. In recent campaigns, the group demonstrated it could exploit flaws even before CVE identifiers had been officially issued. That pre-disclosure exploitation window is deliberately engineered – it gives defenders no time to react before the group is already past the perimeter.
After gaining initial access, Storm-1175 works fast to harvest credentials and map the network. Microsoft observed the group using Bandizip to collect and compress files for staging and Rclone to transfer data to attacker-controlled cloud storage. This data theft is not incidental to the web server ransomware attack – it is central to it. Once data has been exfiltrated, Medusa ransomware is deployed to encrypt remaining files. Victims then face double-extortion pressure: pay to decrypt, and pay to prevent stolen data from appearing on Medusa's public leak site, where it would be visible to customers, partners, and regulators.
The Zero-Day Vulnerabilities Fuelling This Campaign
Microsoft Threat Intelligence identified at least two zero-day vulnerabilities at the core of Storm-1175's 2026 campaigns. CVE-2026-23760 is a flaw in SmarterMail, a widely used enterprise email server. CVE-2025-10035 affects GoAnywhere Managed File Transfer, a platform organisations use for secure file exchange across networks. In both cases, Storm-1175 had working exploits approximately one week before vendors published advisories or patches. For administrators of those systems, there was effectively no warning period. This pattern of exploiting software before patches exist is what elevates this beyond a routine web server ransomware attack scenario – it reflects significant prior intelligence-gathering investment by a well-resourced group.
The Hacker News noted that the GoAnywhere vulnerability shared architectural similarities with a previously patched flaw in the same product, suggesting Storm-1175 studied the existing fix to locate an adjacent attack surface. That kind of targeted vulnerability research is resource-intensive and not typical of opportunistic criminal groups. The group has exploited more than 16 vulnerabilities since 2023, and while zero-days attract headlines, Microsoft's analysis confirms Storm-1175 still primarily relies on N-day flaws – known, patched vulnerabilities that target organisations have simply not applied. Every unpatched web server ransomware attack surface in your environment is a potential Storm-1175 entry point.
The nginx-ui Flaw That Handed Attackers Full Server Control
Separate from Storm-1175 but closely connected in timing, CVE-2026-33032 – nicknamed MCPwn – emerged in late March 2026 as a critical web server ransomware attack enabler in its own right. The flaw exists in nginx-ui, an open-source graphical dashboard for managing nginx web servers that has accumulated more than 11,000 GitHub stars and 430,000 Docker image pulls. Its wide deployment makes it a high-value target. When nginx-ui added Model Context Protocol integration, a missing authentication middleware call in the /mcp_message endpoint left a door open to any network attacker – no credentials required.
How CVE-2026-33032 Works in Practice
The nginx-ui MCP integration exposes two HTTP endpoints. The /mcp endpoint enforces authentication correctly. The /mcp_message endpoint does not. Through that one gap, an unauthenticated attacker can invoke all 12 of nginx-ui's privileged MCP tools – including writing to nginx configuration files and triggering automatic server reloads. In practice, this means full control over the nginx web server with just two HTTP requests, no login needed. A proof-of-concept was published in late March 2026, and The Hacker News reported that approximately 2,689 nginx-ui instances remained exposed on the public internet – a ready-made web server ransomware attack target pool for anyone with the exploit in hand.
Who Remains at Risk After the Patch
The vulnerability was fixed in nginx-ui version 2.3.4, released on March 15, 2026. But patching a self-managed tool like nginx-ui requires administrators to actively monitor the project and deploy updates – neither of which is guaranteed when teams are stretched thin. The fact that a working exploit was publicly available before many administrators had applied the fix means the window for a web server ransomware attack via this vector stayed open for a meaningful period. Researchers at Pluto Security assigned CVE-2026-33032 a CVSS score of 9.8, placing it firmly in the critical severity range.
Sectors Under Pressure and the 24-Hour Window
Microsoft's threat intelligence report identifies healthcare as the sector most heavily impacted by Storm-1175 in recent operations, followed by education, professional services, and financial services. All four sectors share a common characteristic: they depend on internet-facing applications for core business functions – patient portals, learning management systems, client collaboration tools, and financial transaction platforms. Any organisation running public-facing software in these sectors that has not yet treated the web server ransomware attack threat as an operational priority is working with an incomplete picture of its own risk exposure.
The 24-hour ransomware deployment timeline is the most significant element of Storm-1175's operations. In documented incidents, the group moved from its first successful exploit to full Medusa deployment within a single day. For any organisation that assumed a web server ransomware attack would give them several days to detect and respond, this timeline removes that safety margin entirely. Incident response has historically counted on detecting intrusions within 48 to 72 hours. Storm-1175 compresses that window to hours, making automated alerting and rapid patch deployment non-optional capabilities for any organisation with exposed infrastructure.
What This Web Server Ransomware Attack Pattern Reveals
The Storm-1175 web server ransomware attack campaign exposes two persistent failure modes in how organisations manage internet-facing infrastructure. The first is the patching gap. Vendors can publish fixes within days of discovering a vulnerability, but organisations routinely take weeks or months to apply those fixes – especially for applications that require careful testing or planned maintenance windows before updates can be deployed. That delay is the attack surface Storm-1175 is built to exploit, and its operational tempo is specifically calibrated to that gap between disclosure and remediation.
The second failure is over-exposure of management interfaces. Tools like nginx-ui, SmarterMail's admin panel, and GoAnywhere's web interface are all administrative surfaces that have no business reason to be reachable from the open internet without strict access controls. When a web server ransomware attack surface like this is directly accessible on a public IP with no firewall restriction, even a fully patched system carries more risk than one that is properly network-segmented. IP allowlists, VPN requirements, or firewall rules restricting admin interface access to known management hosts reduce the impact of any individual vulnerability before a patch is even available.
Microsoft's full threat intelligence report notes that N-day vulnerabilities – not zero-days – account for the majority of Storm-1175's successful web server ransomware attack intrusions. That finding matters because it means most victims were compromised through vulnerabilities that had available patches. Zero-days generate attention; N-days cause damage at scale. Addressing your existing patch backlog is more impactful than any exotic defensive measure when the attacker is primarily scanning for systems that simply have not been updated.
What Website Owners Should Do After This Warning
The highest-priority action is an inventory and patch check of all internet-facing software. SmarterMail administrators should apply all available updates immediately. GoAnywhere Managed File Transfer users should confirm their patch status. Anyone running nginx-ui should upgrade to v2.3.4 immediately and – just as importantly – confirm that the nginx-ui panel is restricted to trusted IP addresses at the network level, not only via application authentication. Our breakdown of PHP hosting security risks covers the broader pattern of web server ransomware attack exposure through poorly maintained software stacks, and most of that guidance applies across any public-facing application.
For sectors under active Storm-1175 focus – healthcare, education, finance – now is a practical time to review whether your environment logs authentication failures on web-facing applications and whether those logs are actively monitored. A web server ransomware attack that goes undetected for even a few hours gives Storm-1175 enough time to exfiltrate data and establish persistence. Catching an intrusion in its early hours is the difference between a contained security event and a full Medusa double-extortion scenario.
Reviewing baseline security hygiene is worthwhile too. Our guide on SSL certificate renewal best practices covers several hardening steps that reduce your overall attack footprint – from certificate management to ensuring encrypted connections are configured correctly across all public endpoints.
The Bottom Line
Storm-1175's Medusa ransomware campaign and the concurrent CVE-2026-33032 disclosure illustrate what a well-resourced web server ransomware attack operation looks like in 2026: fast, methodical, and targeting organisations that have not kept pace with patching. The 24-hour deployment timeline leaves almost no room for reactive defence. The nginx-ui flaw is a separate but reinforcing example of how a single missing authentication check on a widely deployed management tool can open thousands of servers to complete compromise – without a single stolen credential involved.
Both incidents point to the same practical response: reduce the number of unpatched, publicly accessible systems you operate. Every unnecessary web server ransomware attack surface – an unpatched management panel, an outdated application, an admin interface exposed to the public internet – is a potential entry point. If you want hosting infrastructure where server-level patching and hardening are managed for you, MonsterMegs' LiteSpeed-powered web hosting handles that at the platform level, so the patching burden does not fall entirely on your team.

Top comments (0)