{"id":12148,"date":"2026-02-25T06:24:14","date_gmt":"2026-02-25T06:24:14","guid":{"rendered":"https:\/\/techtrendfeed.com\/?p=12148"},"modified":"2026-02-25T06:24:14","modified_gmt":"2026-02-25T06:24:14","slug":"north-korean-lazarus-group-adopts-medusa-ransomware-in-world-assaults","status":"publish","type":"post","link":"https:\/\/techtrendfeed.com\/?p=12148","title":{"rendered":"North Korean Lazarus Group Adopts Medusa Ransomware in World Assaults"},"content":{"rendered":"<p> <br \/>\n<\/p>\n<div>\n<p>North Korean cyber operations are transferring into the business ransomware market, pointing to a stronger concentrate on producing direct monetary beneficial properties. Latest proof from the Symantec and Carbon Black Menace Hunter Crew reveals the infamous state-backed <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/hackread.com\/tag\/Lazarus\/\" data-type=\"post_tag\" data-id=\"5147\" target=\"_blank\" rel=\"noreferrer noopener\">Lazarus Group<\/a> has been deploying Medusa ransomware towards targets within the Center East and making an attempt to breach healthcare organizations in the US. <\/p>\n<p>Whereas the US try failed, the incident confirms that state-sponsored actors are more and more using established cybercrime instruments to bypass conventional safety.<\/p>\n<p>On your data, the <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/hackread.com\/tag\/Medusa\/\" target=\"_blank\" rel=\"noreferrer noopener\">Medusa<\/a> ransomware operates as a service the place associates use the software program to lock down networks and demand funds in change for a reduce of the revenue. Since its arrival in 2023, the group behind the code has been linked to over 300 profitable assaults, together with <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/hackread.com\/medusa-ransomware-comcast-data-leak\/\" target=\"_blank\" rel=\"noreferrer noopener\">Comcast<\/a> and <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/hackread.com\/nascar-ransomware-confirm-medusa-ransomware-data-breach\/\" target=\"_blank\" rel=\"noreferrer noopener\">NASCAR<\/a>.<\/p>\n<p>Now, by becoming a member of arms with Medusa, Lazarus has gained entry to an present infrastructure that hides their identification behind the persona of a typical cyber prison gang, making attribution and protection harder for cybersecurity researchers and regulation enforcement authorities.<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/hackread.com\/wp-content\/uploads\/2026\/02\/lazarus-group-medusa-ransomware-1.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"994\" height=\"1024\" src=\"https:\/\/hackread.com\/wp-content\/uploads\/2026\/02\/lazarus-group-medusa-ransomware-1-994x1024.jpg\" alt=\"North Korean Lazarus Group Adopts Medusa Ransomware in Global Attacks\" class=\"wp-image-141794\" style=\"aspect-ratio:0.9707265281359018;width:753px;height:auto\" srcset=\"https:\/\/hackread.com\/wp-content\/uploads\/2026\/02\/lazarus-group-medusa-ransomware-1-994x1024.jpg 994w, https:\/\/hackread.com\/wp-content\/uploads\/2026\/02\/lazarus-group-medusa-ransomware-1-291x300.jpg 291w, https:\/\/hackread.com\/wp-content\/uploads\/2026\/02\/lazarus-group-medusa-ransomware-1-768x791.jpg 768w, https:\/\/hackread.com\/wp-content\/uploads\/2026\/02\/lazarus-group-medusa-ransomware-1-1491x1536.jpg 1491w, https:\/\/hackread.com\/wp-content\/uploads\/2026\/02\/lazarus-group-medusa-ransomware-1-380x392.jpg 380w, https:\/\/hackread.com\/wp-content\/uploads\/2026\/02\/lazarus-group-medusa-ransomware-1-800x824.jpg 800w, https:\/\/hackread.com\/wp-content\/uploads\/2026\/02\/lazarus-group-medusa-ransomware-1-1160x1195.jpg 1160w, https:\/\/hackread.com\/wp-content\/uploads\/2026\/02\/lazarus-group-medusa-ransomware-1.jpg 1774w\" sizes=\"auto, (max-width: 994px) 100vw, 994px\"\/><\/a><figcaption class=\"wp-element-caption\">Most up-to-date alleged victims listed on the Medusa ransomware darkish internet leak website, screenshot captured by Hackread.com.<\/figcaption><\/figure>\n<\/div>\n<h3 id=\"multi-stage-attack-chain\" class=\"wp-block-heading\"><strong>Multi-Stage Assault Chain<\/strong><\/h3>\n<p>In accordance with Symantec\u2019s <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.security.com\/threat-intelligence\/lazarus-medusa-ransomware\" target=\"_blank\" rel=\"noreferrer noopener\">weblog put up<\/a> shared with Hackread.com, the Lazarus group\u2019s assaults observe a multi-stage course of with Medusa ransomware deployed solely on the very finish. Lengthy earlier than encryption begins, the group deploys a specialised toolkit to dismantle native safety safety.<\/p>\n<p>They then transfer onto the subsequent step, together with putting in customized backdoors and trojans, together with <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/hackread.com\/us-cert-warns-of-north-korea-blindingcan-trojan\/\" data-type=\"post\" data-id=\"80435\" target=\"_blank\" rel=\"noreferrer noopener\">Blindingcan<\/a> and <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/malpedia.caad.fkie.fraunhofer.de\/details\/win.comebacker\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Comebacker<\/a>, giving them lasting entry to compromised networks. The following step is to deploy credential theft instruments comparable to <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/hackread.com\/ai-jailbreak-on-top-llms-to-create-chrome-infostealer\/\" data-type=\"link\" data-id=\"https:\/\/hackread.com\/ai-jailbreak-on-top-llms-to-create-chrome-infostealer\/\" target=\"_blank\" rel=\"noreferrer noopener\">ChromeStealer<\/a> and <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/hackread.com\/amazon-hacker-ai-tools-breach-fortigate-devices\/\" data-type=\"post\" data-id=\"141759\" target=\"_blank\" rel=\"noreferrer noopener\">Mimikatz<\/a> to gather passwords, whereas a software referred to as Infohook scans for and phases delicate knowledge for exfiltration. <\/p>\n<p>To maneuver stolen data with out drawing discover, the group makes use of <code>RP_Proxy<\/code> to route site visitors internally and depends on the command-line utility Curl to ship information again to its personal servers. By the point the Medusa ransomware is lastly launched, the attackers have already got full management of the community and have extracted its most beneficial knowledge.<\/p>\n<h3 id=\"targets-vulnerable-institutions\" class=\"wp-block-heading\"><strong>Targets: Susceptible Establishments<\/strong><\/h3>\n<p>Concentrating on patterns, as per researchers, reveal a selected concentrate on organizations that present important social providers. In the previous couple of months, the Medusa leak website has named a number of US victims, together with a psychological well being non-profit and a faculty that helps kids with autism. <\/p>\n<p>These assaults typically include a monetary demand averaging round $260,000, a determine calculated to be excessive sufficient for a major payday however low sufficient {that a} determined group would possibly take into account paying to revive providers.<\/p>\n<h3 id=\"not-the-first-time\" class=\"wp-block-heading\"><strong>Not The First Time<\/strong><\/h3>\n<p>This isn&#8217;t the primary time {that a} state-backed North Korea risk actor group has joined arms with a ransomware group. In October 2024, as <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/hackread.com\/north-korean-hackers-play-ransomware-global-attack\/\" target=\"_blank\" rel=\"noreferrer noopener\">reported<\/a> by Hackread.com, Jumpy Pisces, often known as <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/hackread.com\/us-charges-north-korean-hacker-ransomware-attacks-hospitals\/\" target=\"_blank\" rel=\"noreferrer noopener\">Onyx Sleet<\/a> and <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/hackread.com\/todoswift-malware-macos-disguised-bitcoin-pdf-app\/\" data-type=\"post\" data-id=\"119779\" target=\"_blank\" rel=\"noreferrer noopener\">Andariel<\/a> (often known as the \u201cGuardians of Peace\u201d APT, which was behind the notorious <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/hackread.com\/hbo-hacked-game-of-thrones-episodes-data-leaked\/\" target=\"_blank\" rel=\"noreferrer noopener\">HBO knowledge breach<\/a>), collaborated with the Play ransomware group to hold out cyberattacks.<\/p>\n<p>The collaboration was noticed by Palo Alto Networks Unit 42, who famous that the hackers have been using instruments such because the open-source\u00a0<a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/hackread.com\/teamtnt-exploits-ips-malware-attack-docker-clusters\/\" target=\"_blank\" rel=\"noreferrer noopener\">Sliver<\/a>\u00a0and their customized\u00a0<a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/hackread.com\/lazarus-hackers-hit-indian-space-agency\/\" target=\"_blank\" rel=\"noreferrer noopener\">DTrack malware<\/a>\u00a0to maneuver laterally and keep persistence throughout the community.<\/p>\n<h3 id=\"expert-view\" class=\"wp-block-heading\"><strong>Skilled View<\/strong><\/h3>\n<p><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/ca.linkedin.com\/in\/jason-soroko-19b41920\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Jason Soroko<\/a>, Senior Fellow at Sectigo, a Scottsdale, Arizona-based supplier of complete certificates lifecycle administration (CLM), notes the chilly logic behind these decisions. <\/p>\n<p><em>\u201c<\/em>Placing amenities devoted to psychological well being and autistic kids show that these actors prioritize most emotional leverage to make sure swift ransom funds. The comparatively modest common ransom demand suggests a volume-based strategy the place risk actors goal chronically underfunded sectors that merely can not afford extended operational downtime,<em>\u201c<\/em> Soroko famous.<\/p>\n<p>This pattern means that the divide between state-sponsored espionage and street-level extortion is disappearing. When a gaggle like Lazarus adopts Medusa, they create the assets of a nationwide authorities to bear towards small, native establishments.<\/p>\n<p>Organizations that beforehand felt they have been too small to be a goal for worldwide hackers now discover themselves on the middle of worldwide cyber warfare, requiring a rethink of how smaller non-profits and clinics defend their delicate knowledge.<\/p>\n<p>\n\t\t\t<\/div>\n<p><template id="ItGIJ6ThqJl7lapFuIqM"></template><\/script><br \/>\n<br \/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>North Korean cyber operations are transferring into the business ransomware market, pointing to a stronger concentrate on producing direct monetary beneficial properties. Latest proof from the Symantec and Carbon Black Menace Hunter Crew reveals the infamous state-backed Lazarus Group has been deploying Medusa ransomware towards targets within the Center East and making an attempt to [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":12150,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[58],"tags":[7986,145,3079,853,4714,5103,5606,4713,500],"class_list":["post-12148","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-adopts","tag-attacks","tag-global","tag-group","tag-korean","tag-lazarus","tag-medusa","tag-north","tag-ransomware"],"_links":{"self":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/12148","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=12148"}],"version-history":[{"count":1,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/12148\/revisions"}],"predecessor-version":[{"id":12149,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/12148\/revisions\/12149"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/media\/12150"}],"wp:attachment":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=12148"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=12148"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=12148"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}<!-- This website is optimized by Airlift. Learn more: https://airlift.net. Template:. Learn more: https://airlift.net. Template: 69d9690a190636c2e0989534. Config Timestamp: 2026-04-10 21:18:02 UTC, Cached Timestamp: 2026-04-13 16:07:16 UTC -->