Storm-0501

MISP
Type:
Unknown
Country:
Unknown
First seen:
Unknown
Details:

Storm-0501 is a financially motivated cybercriminal group that has been active since 2021, initially targeting US school districts with the Sabbath ransomware and later transitioning to a RaaS model deploying various ransomware strains, including Embargo. The group exploits weak credentials and over-privileged accounts to achieve lateral movement from on-premises environments to cloud infrastructures, establishing persistent backdoor access and deploying ransomware. They have utilized techniques such as credential theft, exploiting vulnerabilities in Zoho ManageEngine and Citrix NetScaler, and employing tools like Cobalt Strike and Rclone for lateral movement and data exfiltration. Storm-0501 has specifically targeted sectors such as government, manufacturing, transportation, and law enforcement in the United States.

MITRE ATT&CK: View on MITRE
Techniques Used (42)
ID ATT&CK Tactics
T1003 OS Credential Dumping -
T1003.006 DCSync -
T1021.006 Windows Remote Management -
T1021.007 Cloud Services -
T1027.002 Software Packing -
T1036.004 Masquerade Task or Service -
T1053.005 Scheduled Task -
T1057 Process Discovery -
T1059.001 PowerShell -
T1059.009 Cloud API -
T1078.004 Cloud Accounts -
T1082 System Information Discovery -
T1087.002 Domain Account -
T1087.004 Cloud Account -
T1098.001 Additional Cloud Credentials -
Metadata
ID: 744
Created: 13/01/2026 17:48
Updated: 07/03/2026 04:00