Medusa Ransomware (MedusaLocker) operates as a Ransomware-as-a-Service with global affiliates, encrypting data and demanding payment. It commonly gains initial access via vulnerable RDP and phishing, erases shadow copies, escalates privileges, and uses Medusa Blog and dark web channels to leak victim data.
#MedusaLocker #MedusaRansomware #MedusaBlog #MinneapolisSchoolDistrict #SartrouvilleFrance #ICDO #SOCRadar
#MedusaLocker #MedusaRansomware #MedusaBlog #MinneapolisSchoolDistrict #SartrouvilleFrance #ICDO #SOCRadar
Keypoints
- Medusa Ransomware has operated since 2021 under a RaaS model with global affiliates, increasing its reach.
- It uses a wide variety of file extensions, with .MEDUSA as a signature marker and multiple variants existing.
- Attack vectors include vulnerable Remote Desktop Protocols (RDP) and phishing, followed by PowerShell-based execution and shadow copy deletion.
- Exploits include CVE-2022-2295 (Type Confusion in Chrome’s V8) to facilitate attacks.
- Ransom notes vary (TXT or HTML), and Medusa operates a Medusa Blog to announce victims and leak data via Telegram/TOR channels.
- High-profile target example: Minneapolis Public School District in 2023, with a $1 million ransom demand.
MITRE Techniques
- [T1078] Valid Accounts – Initial access via compromised credentials and exposed services; quotable usage includes: “The ransomware predominantly gains access to systems through vulnerable Remote Desktop Protocols (RDP) and deceptive phishing campaigns.”
- [T1566] Phishing – Initial access via deceptive phishing campaigns; quotable usage includes: “The ransomware predominantly gains access to systems through vulnerable Remote Desktop Protocols (RDP) and deceptive phishing campaigns.”
- [T1133] External Remote Services – Access gained through external remote services like RDP; quotable usage includes: “The ransomware predominantly gains access to systems through vulnerable Remote Desktop Protocols (RDP) and deceptive phishing campaigns.”
- [T1059.001] Command and Scripting Interpreter: PowerShell – Execution performed via PowerShell; quotable usage includes: “PowerShell for command execution.”
- [T1047] Windows Management Instrumentation – Uses WMI for persistence/execution; quotable usage includes: “Windows Management Instrumentation.”
- [T1547] Boot or Logon Autostart Execution – Persistence via startup mechanisms; quotable usage includes: “Boot or Logon Autostart Execution.”
- [T1548.002] Abuse Elevation Control Mechanism: Bypass User Account Control – Privilege escalation by bypassing UAC; quotable usage includes: “Bypass User Account Control.”
- [T1562.001] Impair Defenses: Disable or Modify Tools – Deactivates defense mechanisms; quotable usage includes: “deactivates defense mechanisms.”
- [T1562.009] Impair Defenses: Safe Mode Boot – Attempts to operate using Safe Mode to evade defenses; quotable usage includes: “Safe Mode Boot.”
- [T1110] Brute Force – Credential access via brute force techniques; quotable usage includes: “Brute Force.”
- [T1083] File and Directory Discovery – Discovery of files/directories on the system; quotable usage includes: “File and Directory Discovery.”
- [T1135] Network Share Discovery – Identifies network shares for lateral movement; quotable usage includes: “Network Share Discovery.”
- [T1012] Query Registry – Querying the Windows Registry for information; quotable usage includes: “Query Registry.”
- [T1021] Remote Services – Movement via remote services like RDP/SMB; quotable usage includes: “Remote Services.”
- [T1105] Ingress Tool Transfer – Transfers tools/assets into the environment for execution; quotable usage includes: “Ingress Tool Transfer.”
- [T1071.001] Web Protocols – C2 communications over application layer web protocols; quotable usage includes: “Application Layer Protocol: Web Protocols.”
- [T1048] Exfiltration Over Alternative Protocol – Data exfiltration over non-standard channels; quotable usage includes: “Exfiltration Over Alternative Protocol.”
- [T1489] Service Stop – Impact tactic by stopping services to hinder operations; quotable usage includes: “Service Stop.”
Indicators of Compromise
- [File Extension] Context – .MEDUSA, .mylock, and other variants (encrypted file extensions)
- [Ransom Note Names] Context – how_to_recover_data.html, instructions.html, READINSTRUCTION.html, and similar files
- [Email Address] Context – unlockmeplease@protonmail[.]com, support@exorints[.]com, rpd@keemail[.]me
- [Payment Wallet] Context – 14oxnsSc1LZ5M2cPZeQ9rFnXqEvPCnZikc, 1DRxUFhvJjGUdojCzMWSLmwx7Qxn79XbJq
- [Additional Email] Context – lockPerfection@gmail[.]com, best666decoder@protonmail[.]com, encrypt2020@outlook[.]com
Read more: https://socradar.io/dark-web-profile-medusa-ransomware-medusalocker/