top of page
MedusaLocker
Name
Category
Type
Targeted OS
Description
Information
MedusaLocker
AKO Doxware
AKO Ransomware
MedusaReborn
Malware
Ransomware
Big Game Hunting
Reconnaissance
Windows
(Cybereason) The MedusaLocker ransomware first emerged in September 2019, infecting and encrypting Windows machines around the world. There have been reports of MedusaLocker attacks across multiple industries, especially the healthcare industry which suffered a great deal of ransomware attacks during the COVID-19 pandemic.
In order to maximize the chances of successful encryption of the files on the compromised machine, MedusaLocker restarts the machine in safe mode before execution. This method is used to avoid security tools that might not run when the computer starts in safe mode.
MedusaLocker avoids encrypting executable files, most likely to avoid rendering the targeted system unusable for paying the ransom. To make it even more dangerous, MedusaLocker uses a combination of AES and RSA-2048, making the procedure of brute forcing the encryption practically impossible.
https://www.cybereason.com/blog/medusalocker-ransomware
https://www.bleepingcomputer.com/news/security/medusalocker-ransomware-wants-its-share-of-your-money/
https://www.binarydefense.com/threat_watch/new-ransomware-medusalocker/
https://www.sentinelone.com/blog/how-medusalocker-ransomware-aggressively-targets-remote-hosts/
https://www.carbonblack.com/blog/tau-threat-analysis-medusa-locker-ransomware/
https://cyware.com/news/uncovering-the-abilities-of-medusalocker-ransomware-3fb92eca
https://blog.talosintelligence.com/2020/04/medusalocker.html
https://www.cisa.gov/uscert/ncas/alerts/aa22-181a
Malpedia
Alienvault OTX
Playbook
nil
CISA
Other Information
Mitre
Mitre Techniques
Mitre Techniques Navigator Link
NIL
['T1133', 'T1566', 'T1059', 'T1562', 'T1486', 'T1490']
bottom of page