top of page

MedusaLocker

Name

Category

Type

Targeted OS

Description

Information

MedusaLocker
AKO Doxware
AKO Ransomware
MedusaReborn

Malware

Ransomware
Big Game Hunting
Reconnaissance

Windows

(Cybereason) The MedusaLocker ransomware first emerged in September 2019, infecting and encrypting Windows machines around the world. There have been reports of MedusaLocker attacks across multiple industries, especially the healthcare industry which suffered a great deal of ransomware attacks during the COVID-19 pandemic.

In order to maximize the chances of successful encryption of the files on the compromised machine, MedusaLocker restarts the machine in safe mode before execution. This method is used to avoid security tools that might not run when the computer starts in safe mode.

MedusaLocker avoids encrypting executable files, most likely to avoid rendering the targeted system unusable for paying the ransom. To make it even more dangerous, MedusaLocker uses a combination of AES and RSA-2048, making the procedure of brute forcing the encryption practically impossible.

Malpedia

Alienvault OTX

Playbook

nil

CISA

Other Information

Mitre

Mitre Techniques

Mitre Techniques  Navigator Link

NIL

['T1133', 'T1566', 'T1059', 'T1562', 'T1486', 'T1490']

bottom of page