Storm-0501
MISPUnknown
Unknown
Unknown
Storm-0501 is a financially motivated cybercriminal group that has been active since 2021, initially targeting US school districts with the Sabbath ransomware and later transitioning to a RaaS model deploying various ransomware strains, including Embargo. The group exploits weak credentials and over-privileged accounts to achieve lateral movement from on-premises environments to cloud infrastructures, establishing persistent backdoor access and deploying ransomware. They have utilized techniques such as credential theft, exploiting vulnerabilities in Zoho ManageEngine and Citrix NetScaler, and employing tools like Cobalt Strike and Rclone for lateral movement and data exfiltration. Storm-0501 has specifically targeted sectors such as government, manufacturing, transportation, and law enforcement in the United States.
Techniques Used (42)
| ID | ATT&CK | Tactics |
|---|---|---|
| T1003 | OS Credential Dumping | - |
| T1003.006 | DCSync | - |
| T1021.006 | Windows Remote Management | - |
| T1021.007 | Cloud Services | - |
| T1027.002 | Software Packing | - |
| T1036.004 | Masquerade Task or Service | - |
| T1053.005 | Scheduled Task | - |
| T1057 | Process Discovery | - |
| T1059.001 | PowerShell | - |
| T1059.009 | Cloud API | - |
| T1078.004 | Cloud Accounts | - |
| T1082 | System Information Discovery | - |
| T1087.002 | Domain Account | - |
| T1087.004 | Cloud Account | - |
| T1098.001 | Additional Cloud Credentials | - |
Related Malware (8)
Metadata
| ID: | 744 |
| Created: | 13/01/2026 17:48 |
| Updated: | 07/03/2026 04:00 |