Sunday, August 31, 2025
  • Home
  • About Us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms & Conditions
marketibiza
  • Home
  • Auto insurance
  • Business insurance
  • Cyber insurance
  • Disability insurance
  • Health insurance
    • Life insurance
    • Insurance Law
    • Travel insurance
  • Contact Us
No Result
View All Result
marketibiza
  • Home
  • Auto insurance
  • Business insurance
  • Cyber insurance
  • Disability insurance
  • Health insurance
    • Life insurance
    • Insurance Law
    • Travel insurance
  • Contact Us
No Result
View All Result
marketibiza
No Result
View All Result
Home Cyber insurance

Medusa Ransomware: What You Want To Know

admin by admin
2025年2月14日
in Cyber insurance
0
Medusa Ransomware: What You Want To Know
74
SHARES
1.2k
VIEWS
Share on FacebookShare on Twitter


What’s the Medusa ransomware?

You might also like

Key Authorities And Personal Companions Meet To Eradicate DPRK’s IT Work Fraud Scheme

Fachkräftemangel bedroht Cybersicherheit | CSO On-line

Oregon Man Charged in ‘Rapper Bot’ DDoS Service – Krebs on Safety

Medusa is a ransomware-as-a-service (RaaS) platform that first got here to prominence in 2023. The ransomware impacts organisations operating Home windows, predominantly exploiting susceptible and unpatched methods and hijacking accounts by means of preliminary entry brokers.

Preliminary entry brokers?

Preliminary entry brokers (IABs) concentrate on gaining unauthorised entry to the networks of organisations, after which promote that entry to different cybercriminals – reminiscent of ransomware gangs like Medusa.

So the ransomware attackers might not be those who initially hacked you?

Right. IABs could also be expert at breaking right into a community, however not essentially be desirous about stealing your information and/or negotiating a ransom. IABs allow ransomware gangs to assault a number of targets concurrently, serving to them to scale back the general time it takes to deploy ransomware, improve the possibilities of success, and maximise their income.

And the assaults aren’t noticed?

Like another malicious hackers, the Medusa attackers do their greatest to keep away from detection. Within the case of Medusa ransomware assaults, they seem to make the most of the “residing off the land” approach, the place attackers use professional instruments and sources already current on a sufferer’s community to hold out malicious actions. As an alternative of counting on exterior malware, this method mimics professional exercise and helps the attackers to evade detection.

So Medusa gives a platform for others to hold out ransomware assaults?

Sure, their associates use the Medusa platform to launch the assaults, and when a ransom is obtained, it’s shared between the completely different events.

And I assume what the ransomware does is the usual fare?

Copies of delicate information are exfiltrated by the attackers, and the variations left on the sufferer’s methods are encrypted. The extension .MEDUSA is appended to the top of the names of encrypted information. 

The ransomware additionally makes efforts to make restoration harder after an assault, wiping a type of Microsoft Home windows information backups referred to as quantity shadow copies, and deleting information with backup applications reminiscent of Home windows Backup. 

As well as, digital disk exhausting drives (VHDs) utilized by digital machines are deleted. A ransom notice is left, demanding cost for a decryption of the encrypted information – with the menace that the stolen information shall be revealed if a ransom just isn’t paid by a deadline.

The place are the stolen information revealed?

Medusa, like many different ransomware gangs, operates a leak website on the darkish net. The so-called “Medusa weblog” publicises an inventory of hacked organisations, alongside a countdown informing the victims of their cost deadline. 

Along with the darkish net leak website, accessible through Tor, Medusa additionally publicises hacks and publishes stolen information on its public Telegram channel. Making it extra accessible than many different ransomware teams.

What forms of organisation does Medusa goal?

Medusa targets all kinds of trade sectors, however judging by these it has listed on its leak web site these sectors most affected embody excessive tech, manufacturing, and schooling. The biggest proportion of Medusa’s targets look like positioned in the USA, adopted by the UK, Canada, Australia, France, and Italy. It is noticeable that organisations primarily based in Belarus, Kazakhstan, Kyrgyzstan, Russia, and Tajikistan don’t seem within the record of victims.

Presumably the dearth of assaults on CIS international locations is kind of intentional?

It is exhausting to argue in any other case. That is small comfort, after all, for these organisations primarily based in international locations that Medusa has no qualms about attacking.

What organisations have been hit by Medusa?

Previous victims have included Minneapolis Public Faculties (MPS) district, which didn’t pay a million-dollar ransom and noticed roughly 92 GB of its stolen data released to the public. It has additionally bragged about stealing the supply code of the Microsoft merchandise Bing Maps and Cortona previously. Different Medusa ransomware victims have included cancer centres, and British high schools.

And these ransomware victims have had their information leaked by Medusa?

Sure, and never simply on the group’s website on the darkish net. Medusa has its personal “media staff” that publicises its leaks, posting on its public Telegram channel, and even going as far as to publish movies displaying proof of stolen information.

So how can my firm defend itself from Medusa?

The best advice is to observe the identical suggestions on how to protect your organisation from different ransomware. These embody:

  • making safe offsite backups.
  • operating up-to-date safety options and guaranteeing that your computer systems are protected with the newest safety patches towards vulnerabilities.
  • utilizing hard-to-crack distinctive passwords to guard delicate information and accounts, in addition to enabling multi-factor authentication.
  • encrypting delicate information wherever doable.
  • lowering the assault floor by disabling performance that your organization doesn’t want.
  • educating and informing workers in regards to the dangers and strategies utilized by cybercriminals to launch assaults and steal information.

Editor’s Observe: The opinions expressed on this and different visitor creator articles are solely these of the contributor and don’t essentially replicate these of Tripwire.

Share30Tweet19
admin

admin

Recommended For You

Key Authorities And Personal Companions Meet To Eradicate DPRK’s IT Work Fraud Scheme

by admin
2025年8月31日
5
Key Authorities And Personal Companions Meet To Eradicate DPRK’s IT Work Fraud Scheme

The U.S. State Division in collaboration with Japan, South Korea, and personal cybersecurity companions met in Tokyo, final week, to attract plans for combating North Korea’s aspect hustle...

Read more

Fachkräftemangel bedroht Cybersicherheit | CSO On-line

by admin
2025年8月30日
2
Fachkräftemangel bedroht Cybersicherheit | CSO On-line

Um die Cybersicherheit in Unternehmen zu stärken, fehlt es derzeit nach wie vor an Fachkräften. Dmitry Kovalchuk – shutterstock.com Ein aktueller Bericht von Accenture besagt, dass lediglich jedes...

Read more

Oregon Man Charged in ‘Rapper Bot’ DDoS Service – Krebs on Safety

by admin
2025年8月29日
1
Oregon Man Charged in ‘Rapper Bot’ DDoS Service – Krebs on Safety

A 22-year-old Oregon man has been arrested on suspicion of working “Rapper Bot,” a large botnet used to energy a service for launching distributed denial-of-service (DDoS) assaults in...

Read more

AI robots can now move CAPTCHAs, and punch you within the face • Graham Cluley

by admin
2025年8月29日
6
AI robots can now move CAPTCHAs, and punch you within the face • Graham Cluley

In episode 62 of The AI Repair, your hosts find out how AI fashions smash by CAPTCHA roadblocks like they’re product of moist tissue paper – a lot...

Read more

How Tokenization Retains Actual-Time Funds Protected

by admin
2025年8月28日
5
How Tokenization Retains Actual-Time Funds Protected

The Unified Funds Interface (UPI) is the heart beat of India’s Digital Economic system with greater than 13 billion transactions per 30 days (as of mid-2025) and is...

Read more
Next Post
6 Inspection Factors When Taking Supply of a New Automotive

6 Inspection Factors When Taking Supply of a New Automotive

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Browse by Category

  • Auto insurance
  • Business insurance
  • Cyber insurance
  • Disability insurance
  • Health insurance
  • Insurance Law
  • Life insurance
  • Travel insurance

Trending News

Key Authorities And Personal Companions Meet To Eradicate DPRK’s IT Work Fraud Scheme

Key Authorities And Personal Companions Meet To Eradicate DPRK’s IT Work Fraud Scheme

2025年8月31日

Finest Employees Compensation Insurance coverage In Virginia

2025年8月31日
Fachkräftemangel bedroht Cybersicherheit | CSO On-line

Fachkräftemangel bedroht Cybersicherheit | CSO On-line

2025年8月30日

Finest Staff Compensation Insurance coverage In West Virginia

2025年8月30日
Is AI insurance coverage actual? Fable busting and clarifying

Is AI insurance coverage actual? Fable busting and clarifying

2025年8月30日
Residual Incapacity Advantages Defined | Full Information

Residual Incapacity Advantages Defined | Full Information

2025年8月29日
Oregon Man Charged in ‘Rapper Bot’ DDoS Service – Krebs on Safety

Oregon Man Charged in ‘Rapper Bot’ DDoS Service – Krebs on Safety

2025年8月29日

Market Biz

Welcome to Marketi Biza The goal of Marketi Biza is to give you the absolute best news sources for any topic! Our topics are carefully curated and constantly updated as we know the web moves fast so we try to as well.

CATEGORIES

  • Auto insurance
  • Business insurance
  • Cyber insurance
  • Disability insurance
  • Health insurance
  • Insurance Law
  • Life insurance
  • Travel insurance

Recent News

Key Authorities And Personal Companions Meet To Eradicate DPRK’s IT Work Fraud Scheme

Key Authorities And Personal Companions Meet To Eradicate DPRK’s IT Work Fraud Scheme

2025年8月31日

Finest Employees Compensation Insurance coverage In Virginia

2025年8月31日
  • Home
  • About Us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms & Conditions

Copyright © 2023 Market Biz All Rights Reserved.

No Result
View All Result
  • Home
  • Auto insurance
  • Business insurance
  • Cyber insurance
  • Disability insurance
  • Health insurance
  • Insurance Law
  • Life insurance
  • Travel insurance
  • Contact Us

Copyright © 2023 Market Biz All Rights Reserved.

Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?