Powered by MOMENTUM MEDIA
lawyers weekly logo

Powered by MOMENTUMMEDIA

Breaking news and updates daily. Subscribe to our Newsletter
Advertisement

CISA says 300 critical infrastructure organisations hit by Medusa ransomware

The Medusa ransomware operation has been turning critical infrastructure operations to stone, having impacted over 300 since its first appearance in 2021.

user icon Daniel Croft
Thu, 13 Mar 2025
CISA says 300 critical infrastructure organisations hit by Medusa ransomware
expand image

Infamous ransomware operation Medusa has reportedly launched cyber attacks on over 300 critical infrastructure entities, according to new findings.

According to a joint advisory from the US Cybersecurity and Infrastructure Security Agency (CISA), the FBI, and the Multi-State Information Sharing and Analysis Centre (MS-ISAC), the ransomware-as-a-service (RaaS) organisation has been targeting entities “from a variety of critical infrastructure sectors with affected industries, including medical, education, legal, insurance, technology, and manufacturing”.

Medusa first appeared in January 2021 and was originally a closed ransomware variant, but saw rapid growth with the release of its Medusa Blog leak site in 2023, which saw it become a RaaS operation as it used it to pressure victim organisations into paying ransom.

“Medusa developers typically recruit initial access brokers (IABs) in cyber criminal forums and marketplaces to obtain initial access [TA0001] to potential victims,” added CISA.

“Potential payments between US$100 and US$1 million are offered to these affiliates with the opportunity to work exclusively for Medusa.”

The group is also known for using living-off-the-land (LOTL) techniques and legitimate tools to prevent detection.

In the four years since it first emerged, the group has listed over 400 victims, including Australian and international critical infrastructure organisations.

In June last year, Medusa claimed a cyber attack on Australian fuel distributor North Coast Petroleum, allegedly having exfiltrated 71.5 gigabytes of data, including invoices, driver’s licence scans, passport details, and creditor bank account details.

A month later, the Harry Perkins Institute of Medical Research confirmed a “cyber incident” as the Medusa ransomware gang claimed to have exfiltrated 4 terabytes of data.

It is also worth noting that Medusa ransomware is a different malware variant from the MedusaLocker and Medusa mobile variants.

The advisory recommends that users ensure operating systems, software and firmware are patched quickly by mitigating known vulnerabilities, blocking access to internal systems and remote servers and more by filtering traffic and blocking suspicious sources, and preventing lateral movement by threat actors between infected devices by segmenting networks.

Daniel Croft

Daniel Croft

Born in the heart of Western Sydney, Daniel Croft is a passionate journalist with an understanding for and experience writing in the technology space. Having studied at Macquarie University, he joined Momentum Media in 2022, writing across a number of publications including Australian Aviation, Cyber Security Connect and Defence Connect. Outside of writing, Daniel has a keen interest in music, and spends his time playing in bands around Sydney.
You need to be a member to post comments. Become a member for free today!

newsletter
cyber daily subscribe
Be the first to hear the latest developments in the cyber industry.