ETDA สำนักงานพัฒนาธุรกรรมทางอิเล็กทรอนิกส์
Electronic Transactions Development Agency
Report
Search
Home > List all groups > List all tools > List all groups using tool MedusaLocker

Threat Group Cards: A Threat Actor Encyclopedia

Permanent link Tool: MedusaLocker

NamesMedusaLocker
AKO Doxware
AKO Ransomware
MedusaReborn
CategoryMalware
TypeRansomware, Big Game Hunting, Reconnaissance
Description(Cybereason) The MedusaLocker ransomware first emerged in September 2019, infecting and encrypting Windows machines around the world. There have been reports of MedusaLocker attacks across multiple industries, especially the healthcare industry which suffered a great deal of ransomware attacks during the COVID-19 pandemic.

In order to maximize the chances of successful encryption of the files on the compromised machine, MedusaLocker restarts the machine in safe mode before execution. This method is used to avoid security tools that might not run when the computer starts in safe mode.

MedusaLocker avoids encrypting executable files, most likely to avoid rendering the targeted system unusable for paying the ransom. To make it even more dangerous, MedusaLocker uses a combination of AES and RSA-2048, making the procedure of brute forcing the encryption practically impossible.
Information<https://www.cybereason.com/blog/medusalocker-ransomware>
<https://www.bleepingcomputer.com/news/security/medusalocker-ransomware-wants-its-share-of-your-money/>
<https://www.binarydefense.com/threat_watch/new-ransomware-medusalocker/>
<https://www.sentinelone.com/blog/how-medusalocker-ransomware-aggressively-targets-remote-hosts/>
<https://www.carbonblack.com/blog/tau-threat-analysis-medusa-locker-ransomware/>
<https://cyware.com/news/uncovering-the-abilities-of-medusalocker-ransomware-3fb92eca>
<https://blog.talosintelligence.com/2020/04/medusalocker.html>
<https://www.cisa.gov/uscert/ncas/alerts/aa22-181a>
<https://blog.talosintelligence.com/threat-actor-believed-to-be-spreading-new-medusalocker-variant-since-2022/>
Malpedia<https://malpedia.caad.fkie.fraunhofer.de/details/win.medusalocker>
AlienVault OTX<https://otx.alienvault.com/browse/pulses?q=tag:medusalocker>

Last change to this tool card: 24 October 2024

Download this tool card in JSON format

All groups using tool MedusaLocker

ChangedNameCountryObserved

APT groups

 EmpireMonkey, CobaltGoblin[Unknown]2018-Mar 2021X

1 group listed (1 APT, 0 other, 0 unknown)

Digital Service Security Center
Electronic Transactions Development Agency

Follow us on

Facebook Twitter

Report incidents

Telephone +66 (0)2-123-1227
E-mail [email protected]