Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Lazarus Group Deploys Medusa Ransomware in Cyber Attacks

Lazarus Group Deploys Medusa Ransomware in Cyber Attacks

Posted on February 24, 2026 By CWS

The infamous Lazarus Group, associated with North Korea, has recently been identified using Medusa ransomware in a cyber attack targeting an unspecified entity in the Middle East. This revelation comes from a report by the Symantec and Carbon Black Threat Hunter Team, highlighting the group’s continued influence in global cyber threats.

Expansion of Medusa Ransomware

The attack in the Middle East is part of a broader strategy by the Lazarus Group, also known by aliases such as Diamond Sleet and Pompilus. Broadcom’s threat intelligence division has noted a parallel attempt by the same actors to infiltrate a healthcare organization in the United States, which was ultimately unsuccessful. Medusa, launched by the Spearwing group in 2023, operates as a ransomware-as-a-service (RaaS), and has been linked to over 366 attacks thus far.

An analysis of the Medusa leak site has unveiled assaults on four U.S.-based organizations, including those in the healthcare and non-profit sectors, over the past months. These attacks included a mental health non-profit and an educational institution for autistic children. It remains unclear if these U.S. targets were specifically chosen by North Korean operatives or if other affiliates of Medusa were responsible. The average ransom demand reported during this period was approximately $260,000.

Historical Context and Tactical Shifts

The use of ransomware by North Korean groups is not a new phenomenon. Since 2021, a Lazarus sub-group known as Andariel, or Stonefly, has targeted nations like South Korea, Japan, and the U.S. with custom ransomware families such as SHATTEREDGLASS and H0lyGh0st. In October 2024, the group transitioned to using an off-the-shelf ransomware variant named Play, further demonstrating a shift in their operational tactics.

Similarly, another North Korean threat actor, Moonstone Sleet, previously deployed a custom ransomware called FakePenny but has since targeted South Korean financial institutions with Qilin ransomware. These developments suggest a strategic move towards collaborating with established RaaS providers rather than creating proprietary tools.

Implications and Future Outlook

According to Dick O’Brien, principal intelligence analyst at Symantec and Carbon Black, the decision to adopt RaaS models like Medusa is likely driven by efficiency. Utilizing established ransomware allows these groups to minimize the effort involved in developing new threats, potentially increasing their operational success.

The Lazarus Group’s Medusa campaign employs a variety of tools including RP_Proxy, Mimikatz, and ChromeStealer, among others. Despite the sophisticated nature of these operations, no specific sub-group within Lazarus has been definitively linked to the Medusa attacks, though similarities to previous Andariel tactics are evident.

The ongoing use of Medusa ransomware underscores the relentless nature of North Korean cyber activities, particularly against U.S. targets. While some cybercriminal organizations avoid healthcare targets due to potential reputational damage, Lazarus appears to operate without such constraints, reflecting their aggressive and opportunistic approach to cybercrime.

The Hacker News Tags:Carbon Black, cyber attacks, Cybersecurity, healthcare attacks, Lazarus Group, Medusa ransomware, North Korea, RaaS, Symantec, threat intelligence

Post navigation

Previous Post: Diesel Vortex Targets Logistics Sector, Steals Credentials
Next Post: Critical Fixes Released for VMware Aria Operations Flaws

Related Posts

What the 2025 Gartner® Magic Quadrant™ Reveals What the 2025 Gartner® Magic Quadrant™ Reveals The Hacker News
China-Linked Amaranth-Dragon Exploits WinRAR Flaw in Southeast Asia China-Linked Amaranth-Dragon Exploits WinRAR Flaw in Southeast Asia The Hacker News
North Korean Hackers Exploit AI for Enhanced Cyber Attacks North Korean Hackers Exploit AI for Enhanced Cyber Attacks The Hacker News
Critical Wing FTP Server Vulnerability (CVE-2025-47812) Actively Being Exploited in the Wild Critical Wing FTP Server Vulnerability (CVE-2025-47812) Actively Being Exploited in the Wild The Hacker News
Vietnamese Hackers Use PXA Stealer, Hit 4,000 IPs and Steal 200,000 Passwords Globally Vietnamese Hackers Use PXA Stealer, Hit 4,000 IPs and Steal 200,000 Passwords Globally The Hacker News
A New Security Layer for macOS Takes Aim at Admin Errors Before Hackers Do A New Security Layer for macOS Takes Aim at Admin Errors Before Hackers Do The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical VMware Aria Flaws Enable Remote Code Attacks
  • Critical Fixes Released for VMware Aria Operations Flaws
  • Lazarus Group Deploys Medusa Ransomware in Cyber Attacks
  • Diesel Vortex Targets Logistics Sector, Steals Credentials
  • Taiwan Cyber Firm Confirms Exploitation by Chinese Hackers

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical VMware Aria Flaws Enable Remote Code Attacks
  • Critical Fixes Released for VMware Aria Operations Flaws
  • Lazarus Group Deploys Medusa Ransomware in Cyber Attacks
  • Diesel Vortex Targets Logistics Sector, Steals Credentials
  • Taiwan Cyber Firm Confirms Exploitation by Chinese Hackers

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News