Accessibility links
  • Skip to main content
News Icon NEWS FILTER
All News Security Education Videos Scams & Phishing Your Security Mobile Security Identity Theft Corporate Security
Search Icon SEARCH
 

Email Icon SUBSCRIBE TO WEEKLY NEWSLETTER
FBI Warns Medusa is Trying to Snake Her Way Into Your Network
Facebook   X   LinkedIn   Email

FBI Warns Medusa is Trying to Snake Her Way Into Your Network

April 20, 2025

The Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA) recently issued a warning about a ransomware-as-a-service variant that has been on the attack since December. The Medusa ransomware, a sophisticated cyber threat that has targeted over 300 victims across critical infrastructure sectors. These include, healthcare, education, and manufacturing.

Medusa operates as a Ransomware-as-a-Service (RaaS), recruiting affiliates from criminal forums to conduct attacks. This means there is a package deal out there offered by the authors that acts as a sort of plug and play product for those wanting to use it.

The group employs tactics such as phishing campaigns and exploiting unpatched software vulnerabilities to gain unauthorized access to systems.

Once it has made its way inside, Medusa encrypts the victim's data and threatens to publicly release it unless a ransom is paid—a strategy known as double extortion.

The group behind it maintains a data-leak site where they list victims and display a countdown timer for the public release of stolen data.

If executed, Medusa ransomware can severely disrupt operations by encrypting critical data, rendering it inaccessible. The double extortion tactic adds pressure on victims to comply with ransom demands to prevent sensitive information from being leaked publicly. This can lead to financial losses, reputational damage, and potential legal ramifications, especially if personal identifiable information (PII) is exposed.

Preventative Measures

To mitigate the risk of falling victim to Medusa ransomware, organizations are advised to:

  • Keep Systems Updated: Regularly update operating systems, software, and firmware to patch known vulnerabilities. Make sure the versions you are using are still supported by the developers.
  • Implement Multifactor Authentication (MFA): Employ MFA for all services, especially those accessible remotely, to add an extra layer of security. This prevents an attacker from getting into your accounts since they won’t’ have your MFA code.
  • Use Strong Passwords: Enforce the use of long, complex passwords and avoid reusing passwords across different accounts. Use at least 8 characters mixing letters (upper and lower case), numbers, and special characters.
  • Network Segmentation: Segment networks to prevent the spread of ransomware and limit access to critical systems. You can even do this at home with most WiFi routers these days. Use one for your computers, tablets, and smartphones and the other for all of the other internet-connected devices such as your smart light switches, thermostats, and cooking appliances.
  • Regular Backups: Maintain offline, encrypted backups of critical data and regularly test restoration procedures. Large backup drives are inexpensive and abundant these days. Find one you like and use it.
  • Of course, Be on the Lookout for Phishing: Phishing is a powerful tool used against victims for nearly all ransomware attacks. Don't click links or attachments in email or texts that are from unfamiliar senders or that you aren't expecting. If they make you think it's urgent that you click something, it's most likely phishing.

By adopting these measures, organizations can enhance their resilience against ransomware threats like Medusa and protect their critical assets from potential compromise.


Trinity Double-Extortion Ransomware Group Targets Healthcare

Identity Theft

Trinity Double-Extortion Ransomware Group Targets Healthcare

Healthcare is a favorite target for ransomware attacks since they disrupt hospitals and doctors and put patient well-being at risk. With so much in jeopardy, victims are likely to quickly pay the cryptocurrency ransom demand. Paying a ransom to have your organizations sensitive information returned is bad enough. But when the hacker also threatens double-extortion—publicly exposing your ransomed data if you don’t pay up, it’s even worse. That’s exactly how the hacking group behind Trinity ransomware terrorizes their victims, including the healthcare sector. READ FULL STORY

Toyota Customer Data Offered on Cybercrime Forum for Free

Identity Theft

Toyota Customer Data Offered on Cybercrime Forum for Free

Toyota has confirmed a significant data breach after a threat actor, known as ZeroSevenGroup, leaked 240GB of stolen data on a cybercrime forum. The stolen data reportedly includes sensitive information about Toyota employees, customers, contracts, financial details, and network infrastructure, among other things. The breach specifically targeted a U.S. branch of Toyota. The scale of the breach is concerning, as the data includes a wide range of sensitive details. READ FULL STORY

Bank of America Customers Caught In Vendor Hack

Identity Theft

Bank of America Customers Caught In Vendor Hack

Breaches of third-party vendors are a growing security threat. Bank of America advised customers that a vendor security breach compromised a blockbuster amount of PII. The stolen data was the result of a breach of one of the bank’s service providers, Infosys McCamish Systems (IMS). The vendor announced the breach, and by extension it led to the sensitive data of Bank of America customers being accessed. It’s estimated that more than 57,000 B of A customers were victims. READ FULL STORY

Carbanak Is Back! Ransomware Group Reinvents Itself

Corporate Security

Carbanak Is Back! Ransomware Group Reinvents Itself

Since the arrest of Carbanak's leader five years ago, the notorious ransomware group is back with a vengeance. The Carbanak ransomware syndicate gained notoriety as a highly effective cybercrime ring targeting financial and banking institutions worldwide. And now, the group has reinvented its method of attacks to reemerge as yet another force to be reckoned with. The group recently shifted their ransomware attacks from financial targets to posing as business software like HubSpot and Xero on compromised websites. READ FULL STORY

This Year's More Sophisticated, Trending Attacks

Corporate Security

This Year's More Sophisticated, Trending Attacks

The attack landscape predictions for this coming year are coming in. This time, cybercriminals are expected to up the ante making attacks like ransomware more sophisticated and effective. And the use of AI makes all attacks real wild cards. Organizations are in the spotlight preparing for this year's crop of improving cyberattacks and new regulations are playing a part. But they won’t stop the attacks, so keeping on top of the risks is your best bet. READ FULL STORY








Close
Fraud News & Alerts!

Keep up with the latest cyber security news through our weekly Fraud News & Alerts updates. Each week you will receive an email containing the latest cyber security news, tips and breach notifications.



You're all set!

You will receive your first official security update email within the next week.

A welcome email has also just been sent to you. If you do not receive this email within the next few minutes, please check your Junk box or spam filter to confirm our emails are not being blocked.


 
Help  
Enter any word or words you like.        

The email newsletter will arrive from news@stickleyonsecurity.com


Loading
Please wait...