Cyber Security News

Medusa Ransomware Attacks Grown By 42% With New Tools & Techniques

Medusa ransomware attacks have surged by 42% between 2023 and 2024, with activity continuing to escalate into 2025.

Almost twice as many Medusa attacks were observed in January and February 2025 compared to the first two months of 2024, indicating a concerning trend in this evolving threat landscape.

The growing prevalence of these attacks can be clearly seen in the data visualization from the Medusa leaks site, which tracks the steadily increasing attack frequency over the past two years.

Medusa ransomware attacks, 2023-2025 (Source – Symantec)

Analysts at Symantec noted that the Medusa ransomware is reportedly operated as a ransomware-as-a-service (RaaS) by a group tracked as Spearwing.

Following the pattern of most modern ransomware operators, Spearwing and its affiliates implement double extortion attacks, first stealing victims’ data before encrypting networks to increase pressure on victims to pay ransoms.

Since becoming active in early 2023, Spearwing has accumulated hundreds of victims, with almost 400 organizations listed on their data leaks site, though the actual number is likely much higher.

Ransoms demanded by attackers using the Medusa ransomware have varied widely, ranging from $1,000 up to $15 million, with victims typically given 10 days to pay.

Those seeking deadline extensions are charged an additional $10,000 per day.

The recent decline of well-known ransomware groups like Noberus and LockBit following law enforcement actions in 2023 and 2024 has created opportunities for groups like Medusa to expand their operations and fill the resulting gap in the ransomware ecosystem.

What sets Medusa apart is its consistent attack methodology across victims.

When Medusa operators compromise a network, they typically utilize remote management and monitoring software such as SimpleHelp or AnyDesk to establish access and download additional tools.

In almost all observed Medusa attacks, the operators employ a technique known as Bring Your Own Vulnerable Driver (BYOVD), deploying KillAV and associated vulnerable drivers to disable security software and evade detection.

Attack Chain

Medusa attacks follow a distinctive pattern, with PDQ Deploy being a particularly common tool in their arsenal.

In nearly two-thirds of investigated Medusa ransomware attacks, researchers observed the same file path being used: csidl_windows\adminarsenal\pdqdeployrunner\service-1\exec with the file name gaze.exe.

Other tools frequently deployed include Navicat for database access, RoboCopy for file manipulation, and Rclone for data exfiltration.

The ransomware itself adds the .medusa extension to encrypted files and drops a ransom note named !READ_ME_MEDUSA!!!.txt on affected systems.

The ransomware contains sophisticated capabilities, accepting multiple arguments that perform various tasks, including version display (-V), system folder exclusion (-f), network drive usage (-n), and self-deletion prevention (-d).

What makes Medusa particularly challenging for forensic analysis is its ability to delete itself from victim machines once encryption is complete, complicating investigation efforts into these increasingly prevalent attacks.

Are you from SOC/DFIR Teams? – Analyse Malware Incidents & get live Access with ANY.RUN -> Start Now for Free.

Tushar Subhra Dutta

Tushar is a Cyber security content editor with a passion for creating captivating and informative content. With years of experience under his belt in Cyber Security, he is covering Cyber Security News, technology and other news.

Recent Posts

PupkinStealer Attacks Windows System to Steal Login Credentials & Desktop Files

A new information-stealing malware dubbed "PupkinStealer" has been identified by cybersecurity researchers, targeting sensitive user…

9 hours ago

Malware Defense 101 – Identifying and Removing Modern Threats

The cybersecurity landscape in 2025 is defined by increasingly sophisticated malware threats, with attackers leveraging…

18 hours ago

AI Security Frameworks – Ensuring Trust in Machine Learning

As artificial intelligence transforms industries and enhances human capabilities, the need for strong AI security…

19 hours ago

Preventing Phishing Attacks on Cryptocurrency Exchanges

Cryptocurrency exchanges are intensifying security measures in 2025 to focus on preventing phishing attacks, as…

21 hours ago

Adversarial Machine Learning – Securing AI Models

As AI systems using adversarial machine learning integrate into critical infrastructure, healthcare, and autonomous technologies,…

1 day ago

10 Best NGINX Monitoring Tools – 2025

NGINX monitoring tools ensure NGINX web servers' optimal performance and reliability. These tools provide comprehensive…

1 day ago