MedusaLocker
Description
(Cybereason) The MedusaLocker ransomware first emerged in September 2019, infecting and encrypting Windows machines around the world. There have been reports of MedusaLocker attacks across multiple industries, especially the healthcare industry which suffered a great deal of ransomware attacks during the COVID-19 pandemic.
In order to maximize the chances of successful encryption of the files on the compromised machine, MedusaLocker restarts the machine in safe mode before execution. This method is used to avoid security tools that might not run when the computer starts in safe mode.
MedusaLocker avoids encrypting executable files, most likely to avoid rendering the targeted system unusable for paying the ransom. To make it even more dangerous, MedusaLocker uses a combination of AES and RSA-2048, making the procedure of brute forcing the encryption practically impossible.
Names
Name |
---|
MedusaLocker |
AKO Doxware |
AKO Ransomware |
MedusaReborn |
Category
Malware
Type
- Ransomware
- Big Game Hunting
- Reconnaissance
Information
- https://www.cybereason.com/blog/medusalocker-ransomware
- https://www.bleepingcomputer.com/news/security/medusalocker-ransomware-wants-its-share-of-your-money/
- https://www.binarydefense.com/threat_watch/new-ransomware-medusalocker/
- https://www.sentinelone.com/blog/how-medusalocker-ransomware-aggressively-targets-remote-hosts/
- https://www.carbonblack.com/blog/tau-threat-analysis-medusa-locker-ransomware/
- https://cyware.com/news/uncovering-the-abilities-of-medusalocker-ransomware-3fb92eca
- https://blog.talosintelligence.com/2020/04/medusalocker.html
- https://www.cisa.gov/uscert/ncas/alerts/aa22-181a
- https://blog.talosintelligence.com/threat-actor-believed-to-be-spreading-new-medusalocker-variant-since-2022/
Malpedia
Alienvault Otx
Other Information
Uuid
2680cd2f-0911-418c-8414-d01b475df8f2
Last Card Change
2024-10-24