Several servers tied with MedusaLocker ransomware have been spotted in the wild. These servers are located in Russia and are found to host multiple exploit tools such as Metasploit, Acunetix, Posh, and Deimos.

What does the research say?

  • Attack surface risk management firm Censys revealed details of various Russian servers that contained a malware kit pointing to the MedusaLocker group that is known for targeting organizations in the healthcare industry.
  • Censys found that the data found on the servers overlapped with the indicators of the MedusaLocker campaign. These data include certificates, software, fingerprints, and other attack vectors used to breach computers.
  • While a majority of victims of ransomware are from different U.S. states, such as Virginia, Ohio, New Jersey, and California, other affected countries include Taiwan, China, and the Netherlands.

Earlier CISA had warned about the ransomware

  • Earlier this month, the U.S. federal government issued a warning about widespread campaigns of MedusaLocker ransomware that exploited unsecured remote desktop protocol. These attacks were reported as recently as May.
  • The attackers leveraged phishing emails as initial intrusion vectors to deliver the ransomware onto the victims’ machines.
  • Once executed, the ransomware restarts the machine in safe mode to avoid detection by security software. Later, it encrypts victims’ files with AES-256 and RSA-2048 algorithms before appending an extension to them.
  • The note outlined that the size of the ransom demands was fixed by the group depending on the financial status of the victim organization.

Key point

While the investigation is on whether other ransomware groups are using the servers linked to MedusaLocker, some domains hosted on servers are found to belong to the Karma ransomware group.

Mitigation measure suggested

Researchers note that attackers are always looking for vulnerable tools and software to gain initial access to the network. Hence, organizations have recommended several mitigation measures to prevent ransomware attacks. These include implementing a recovery plan that maintains and retains multiple copies of sensitive data, regularly updating software with the latest versions, and enforcing MFA, among others.
Cyware Publisher

Publisher

Cyware