Close Menu
World Forbes – Business, Tech, AI & Global Insights
  • Home
  • AI
  • Billionaires
  • Business
  • Cybersecurity
  • Education
    • Innovation
  • Money
  • Small Business
  • Sports
  • Trump
What's Hot

Farmers’ Almanac to cease publication after 2 centuries of predicting the weather

November 7, 2025

Rockefeller Christmas tree begins journey to NYC from upstate

November 6, 2025

What to do if your airport is on the FAA’s flight cut list

November 6, 2025
Facebook X (Twitter) Instagram
Trending
  • Farmers’ Almanac to cease publication after 2 centuries of predicting the weather
  • Rockefeller Christmas tree begins journey to NYC from upstate
  • What to do if your airport is on the FAA’s flight cut list
  • Why autoimmune diseases mostly strike women and are often misdiagnosed
  • Why autoimmune diseases mostly strike women and are often misdiagnosed
  • How A $500 Million Cash Infusion From Wall Street Adds Billions To Ripple’s Founders’ Net Worths
  • Thousands of miles of lost Roman roads are uncovered using aerial photos
  • Toy Hall of Fame recognizes Slime, Battleship, Trivial Pursuit
World Forbes – Business, Tech, AI & Global InsightsWorld Forbes – Business, Tech, AI & Global Insights
Friday, November 7
  • Home
  • AI
  • Billionaires
  • Business
  • Cybersecurity
  • Education
    • Innovation
  • Money
  • Small Business
  • Sports
  • Trump
World Forbes – Business, Tech, AI & Global Insights
Home » Medusa Ransomware Made 300 Critical Infrastructure Victims
Cybersecurity

Medusa Ransomware Made 300 Critical Infrastructure Victims

By adminMarch 13, 2025No Comments3 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr WhatsApp Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email
Post Views: 121


Since June 2021, Medusa ransomware-as-a-service (RaaS) affiliates have hit over 300 critical infrastructure organizations, the US government warns.

Medusa was initially operated as a closed ransomware, and, although it is currently using an affiliate model, ransom negotiations are still conducted by the malware developers, CISA, the FBI, and the Multi-State Information Sharing and Analysis Center (MS-ISAC) note in a joint alert.

The group engages in double extortion, encrypting victims’ data but also stealing it and threatening to leak it unless a ransom is paid. Medusa’s operators offer payments ranging between $100 and $1 million to affiliates working exclusively for them, the three agencies say.

The group has been observed relying on phishing to steal victims’ credentials, and exploiting unpatched vulnerabilities for initial access, including CVE-2024-1709 (the ’SlashAndGrab’ ScreenConnect flaw) and CVE-2023-48788 (SQL injection bug in Fortinet EMS).

The Medusa ransomware affiliates have been using living-off-the-land (LOTL) and legitimate tools for reconnaissance, detection evasion, lateral movement in the compromised environments, and data exfiltration.

Before encrypting the victim’s data, the attackers disable security software, terminate processes related to backups, security, data sharing, and communication, and erase shadow copies to prevent file recovery.

“The actors then manually turn off and encrypt virtual machines and delete their previously installed tools,” CISA, FBI, and MS-ISAC say.

The Medusa ransomware group lists victims on its Tor-based leak site, where it posts ransom demands and advertises the sale of data. It has been observed contacting victims by phone or email, and allowing victims to extend the ransom payment deadline by paying an additional $10,000 per day.

Advertisement. Scroll to continue reading.

“FBI investigations identified that after paying the ransom, one victim was contacted by a separate Medusa actor who claimed the negotiator had stolen the ransom amount already paid and requested half of the payment be made again to provide the “true decryptor”— potentially indicating a triple extortion scheme,” the US government alert reads.

CISA, FBI, and MS-ISAC published their joint advisory roughly a week after Symantec warned of an increase in Medusa attacks. Tracked as Spearwing and Storm-1175, the ransomware gang has been targeting organizations in the US, Australia, Israel, India, Portugal, the UK, UAE, and other countries.

Related: FBI: Fake Ransomware Attack Claims Sent to US Executives via Snail Mail

Related: Watch Now: Ransomware Resilience & Recovery Summit – All Sessions Available on Demand

Related: FBI Warns of HiatusRAT Attacks on Cameras, DVR Systems

Related: CISA Warns of Attacks Exploiting NextGen Healthcare Mirth Connect Flaw



Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
admin
  • Website

Related Posts

O2 Service Vulnerability Exposed User Location

May 20, 2025

Madhu Gottumukkala Officially Announced as CISA Deputy Director

May 20, 2025

BreachRx Lands $15 Million as Investors Bet on Breach-Workflow Software

May 19, 2025

Printer Company Procolored Served Infected Software for Months

May 19, 2025

UK Legal Aid Agency Finds Data Breach Following Cyberattack

May 19, 2025

480,000 Catholic Health Patients Impacted by Serviceaide Data Leak

May 19, 2025
Add A Comment
Leave A Reply

Don't Miss
Billionaires

How A $500 Million Cash Infusion From Wall Street Adds Billions To Ripple’s Founders’ Net Worths

November 6, 2025

The company behind the world’s fourth largest crypto is reinventing itself as a conglomerate. Two…

World’s Largest Bubble Tea Chain Mixue Mints Two Newcomers To China’s 100 Richest List

November 5, 2025

Combined Wealth Surges Nearly A Third To $1.35 Trillion; Bottled Water Billionaire Zhong Shanshan Is No. 1

November 5, 2025

The Biggest Billionaire Donors To HBCUs

November 5, 2025
Our Picks

Farmers’ Almanac to cease publication after 2 centuries of predicting the weather

November 7, 2025

Rockefeller Christmas tree begins journey to NYC from upstate

November 6, 2025

What to do if your airport is on the FAA’s flight cut list

November 6, 2025

Why autoimmune diseases mostly strike women and are often misdiagnosed

November 6, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

About Us
About Us

Welcome to World-Forbes.com
At World-Forbes.com, we bring you the latest insights, trends, and analysis across various industries, empowering our readers with valuable knowledge. Our platform is dedicated to covering a wide range of topics, including sports, small business, business, technology, AI, cybersecurity, and lifestyle.

Our Picks

After Klarna, Zoom’s CEO also uses an AI avatar on quarterly call

May 23, 2025

Anthropic CEO claims AI models hallucinate less than humans

May 22, 2025

Anthropic’s latest flagship AI sure seems to love using the ‘cyclone’ emoji

May 22, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

Facebook X (Twitter) Instagram Pinterest
  • Home
  • About Us
  • Advertise With Us
  • Contact Us
  • DMCA Policy
  • Privacy Policy
  • Terms & Conditions
© 2025 world-forbes. Designed by world-forbes.

Type above and press Enter to search. Press Esc to cancel.