Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

How the Green Energy Transfer Will Increase Productivity in the UK

Nighteagle apt exploits Microsoft Exchange flaws to target China’s military and technical sectors

Intestinal bacteria can cleanse the body of toxic PFAS chemicals

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Medusa ransomware hit more than 40 casualties in 2025, demanding ransoms of $10 million to $15 million
Identity

Medusa ransomware hit more than 40 casualties in 2025, demanding ransoms of $10 million to $15 million

userBy userMarch 6, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

March 6, 2025Ravi LakshmananThreat Intelligence/Vulnerability

The threat actor behind the Medusa ransomware has claimed nearly 400 casualties since its first appearance in January 2023, and the financially motivated attack witnessed a 42% increase between 2023 and 2024.

According to data from the Symantec Threat Hunter team, in the first two months of 2025 alone, the group claims more than 40 attacks. Cybersecurity companies track clusters under the name Spearwing.

“Like most ransomware operators, Spearwing and its affiliates will carry out double horror attacks, stealing victims’ data and putting pressure on victims to encrypt their networks and paying ransom,” Symantec said.

Cybersecurity

“If the victim refuses to pay, the group will threaten to release the stolen data from the data leak site.”

Other ransomware (RAAS) players as services like Ransomhub (aka Greenbottle and Cyclops), Play (aka Balloonfly), Qilin (aka Agenda, Stinkbug, and Water Galura) have benefited from the disruption of Blackbit and Blackcat’s chaos, a threat to rockbit and blackcat’s chaos. By two prolific fearful lorists.

It has been appearing in the wild in recent months as the ransomware landscape continues to be in fluid state and new Raas operations such as Anubis, Schifer Locker, Core, Dange, lcryx, Roche, Vgod, Xelera are stable.

Medusa has a track record of tough ransoms from healthcare providers and nonprofits ranging from $15 million to $100,000, and targets financial and government organizations.

Attack chains attached to ransomware syndicates primarily utilize known security flaws in published Microsoft Exchange Server applications, providing initial access. It is also suspected that threat actors are using early access brokers to violate networks of interest.

Cybersecurity

Once the scaffolding is successful, hackers use remote management and monitoring (RMM) software such as simplehelp, anydesk, or meshagent to terminate the antivirus process using Killav, using proven tested tests, using Vulnerable Driver (BYOVD) techniques. It is worth pointing out that Killav has been used previously in black cat ransomware attacks.

“The use of legitimate RMM software PDQ deployments is another feature of Medusa ransomware attacks,” Symantec said. “Usubordinarily, attackers are used to drop other tools and files and move the victim network sideways.”

Other tools deployed during the course of the Medusa ransomware attack include database queries, robo copying, and NAVICAT to access and run RCLONE.

“Like most targeted ransomware groups, Spearwing tends to attack large organizations across a variety of sectors,” Symantec said. “Ransomware groups tend to be driven purely by profit, not ideological or moral considerations.”

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleMonitoring AMR in water to reduce the spread of infection
Next Article Sodexo begins nutrition reporting – Conference News
user
  • Website

Related Posts

Nighteagle apt exploits Microsoft Exchange flaws to target China’s military and technical sectors

July 4, 2025

AI Agent may be leaking data – Watch this webinar and learn how to stop it

July 4, 2025

A critical sudo vulnerability allows local users to gain root access to Linux and affect major distributions

July 4, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

How the Green Energy Transfer Will Increase Productivity in the UK

Nighteagle apt exploits Microsoft Exchange flaws to target China’s military and technical sectors

Intestinal bacteria can cleanse the body of toxic PFAS chemicals

AI Agent may be leaking data – Watch this webinar and learn how to stop it

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Meta’s Secret Weapon: The Superintelligence Unit That Could Change Everything 

Unlocking the Power of Prediction: The Rise of Digital Twins in the IoT World

TwinH: Digital Human Twin Aims for Victory at Break the Gap 2025

The Digital Twin Revolution: Reshaping Industry 4.0

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.