• About Us
  • Privacy Policy
  • Disclaimer
  • Contact Us
TechTrendFeed
  • Home
  • Tech News
  • Cybersecurity
  • Software
  • Gaming
  • Machine Learning
  • Smart Home & IoT
No Result
View All Result
  • Home
  • Tech News
  • Cybersecurity
  • Software
  • Gaming
  • Machine Learning
  • Smart Home & IoT
No Result
View All Result
TechTrendFeed
No Result
View All Result

North Korean Lazarus Group Adopts Medusa Ransomware in World Assaults

Admin by Admin
February 25, 2026
Home Cybersecurity
Share on FacebookShare on Twitter


North Korean cyber operations are transferring into the business ransomware market, pointing to a stronger concentrate on producing direct monetary beneficial properties. Latest proof from the Symantec and Carbon Black Menace Hunter Crew reveals the infamous state-backed Lazarus Group has been deploying Medusa ransomware towards targets within the Center East and making an attempt to breach healthcare organizations in the US.

Whereas the US try failed, the incident confirms that state-sponsored actors are more and more using established cybercrime instruments to bypass conventional safety.

On your data, the Medusa ransomware operates as a service the place associates use the software program to lock down networks and demand funds in change for a reduce of the revenue. Since its arrival in 2023, the group behind the code has been linked to over 300 profitable assaults, together with Comcast and NASCAR.

Now, by becoming a member of arms with Medusa, Lazarus has gained entry to an present infrastructure that hides their identification behind the persona of a typical cyber prison gang, making attribution and protection harder for cybersecurity researchers and regulation enforcement authorities.

North Korean Lazarus Group Adopts Medusa Ransomware in Global Attacks
Most up-to-date alleged victims listed on the Medusa ransomware darkish internet leak website, screenshot captured by Hackread.com.

Multi-Stage Assault Chain

In accordance with Symantec’s weblog put up shared with Hackread.com, the Lazarus group’s assaults observe a multi-stage course of with Medusa ransomware deployed solely on the very finish. Lengthy earlier than encryption begins, the group deploys a specialised toolkit to dismantle native safety safety.

They then transfer onto the subsequent step, together with putting in customized backdoors and trojans, together with Blindingcan and Comebacker, giving them lasting entry to compromised networks. The following step is to deploy credential theft instruments comparable to ChromeStealer and Mimikatz to gather passwords, whereas a software referred to as Infohook scans for and phases delicate knowledge for exfiltration.

To maneuver stolen data with out drawing discover, the group makes use of RP_Proxy to route site visitors internally and depends on the command-line utility Curl to ship information again to its personal servers. By the point the Medusa ransomware is lastly launched, the attackers have already got full management of the community and have extracted its most beneficial knowledge.

Targets: Susceptible Establishments

Concentrating on patterns, as per researchers, reveal a selected concentrate on organizations that present important social providers. In the previous couple of months, the Medusa leak website has named a number of US victims, together with a psychological well being non-profit and a faculty that helps kids with autism.

These assaults typically include a monetary demand averaging round $260,000, a determine calculated to be excessive sufficient for a major payday however low sufficient {that a} determined group would possibly take into account paying to revive providers.

Not The First Time

This isn’t the primary time {that a} state-backed North Korea risk actor group has joined arms with a ransomware group. In October 2024, as reported by Hackread.com, Jumpy Pisces, often known as Onyx Sleet and Andariel (often known as the “Guardians of Peace” APT, which was behind the notorious HBO knowledge breach), collaborated with the Play ransomware group to hold out cyberattacks.

The collaboration was noticed by Palo Alto Networks Unit 42, who famous that the hackers have been using instruments such because the open-source Sliver and their customized DTrack malware to maneuver laterally and keep persistence throughout the community.

Skilled View

Jason Soroko, Senior Fellow at Sectigo, a Scottsdale, Arizona-based supplier of complete certificates lifecycle administration (CLM), notes the chilly logic behind these decisions.

“Placing amenities devoted to psychological well being and autistic kids show that these actors prioritize most emotional leverage to make sure swift ransom funds. The comparatively modest common ransom demand suggests a volume-based strategy the place risk actors goal chronically underfunded sectors that merely can not afford extended operational downtime,“ Soroko famous.

This pattern means that the divide between state-sponsored espionage and street-level extortion is disappearing. When a gaggle like Lazarus adopts Medusa, they create the assets of a nationwide authorities to bear towards small, native establishments.

Organizations that beforehand felt they have been too small to be a goal for worldwide hackers now discover themselves on the middle of worldwide cyber warfare, requiring a rethink of how smaller non-profits and clinics defend their delicate knowledge.



Tags: AdoptsAttacksglobalGroupKoreanLazarusMedusaNorthRansomware
Admin

Admin

Next Post
Construct an clever photograph search utilizing Amazon Rekognition, Amazon Neptune, and Amazon Bedrock

Construct an clever photograph search utilizing Amazon Rekognition, Amazon Neptune, and Amazon Bedrock

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Trending.

Reconeyez Launches New Web site | SDM Journal

Reconeyez Launches New Web site | SDM Journal

May 15, 2025
Apollo joins the Works With House Assistant Program

Apollo joins the Works With House Assistant Program

May 17, 2025
Safety Amplified: Audio’s Affect Speaks Volumes About Preventive Safety

Safety Amplified: Audio’s Affect Speaks Volumes About Preventive Safety

May 18, 2025
Discover Vibrant Spring 2025 Kitchen Decor Colours and Equipment – Chefio

Discover Vibrant Spring 2025 Kitchen Decor Colours and Equipment – Chefio

May 17, 2025
Flip Your Toilet Right into a Good Oasis

Flip Your Toilet Right into a Good Oasis

May 15, 2025

TechTrendFeed

Welcome to TechTrendFeed, your go-to source for the latest news and insights from the world of technology. Our mission is to bring you the most relevant and up-to-date information on everything tech-related, from machine learning and artificial intelligence to cybersecurity, gaming, and the exciting world of smart home technology and IoT.

Categories

  • Cybersecurity
  • Gaming
  • Machine Learning
  • Smart Home & IoT
  • Software
  • Tech News

Recent News

Marquis Sues SonicWall Over 2025 Firewall Knowledge Breach

Marquis Sues SonicWall Over 2025 Firewall Knowledge Breach

February 26, 2026
New methodology may enhance LLM coaching effectivity | MIT Information

New methodology may enhance LLM coaching effectivity | MIT Information

February 26, 2026
  • About Us
  • Privacy Policy
  • Disclaimer
  • Contact Us

© 2025 https://techtrendfeed.com/ - All Rights Reserved

No Result
View All Result
  • Home
  • Tech News
  • Cybersecurity
  • Software
  • Gaming
  • Machine Learning
  • Smart Home & IoT

© 2025 https://techtrendfeed.com/ - All Rights Reserved