Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Former Defense Contractor Boss Gets 7+ Years for Selling Zero Days

February 25, 2026

CISA Flags Four Security Flaws Under Active Exploitation in Latest KEV Update

February 25, 2026

44% Surge in App Exploits as AI Speeds Up Cyber-Attacks, IBM Finds

February 25, 2026
Facebook X (Twitter) Instagram
Thursday, February 26
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»North Korean Lazarus Group Expands Ransomware Activity With Medusa
News

North Korean Lazarus Group Expands Ransomware Activity With Medusa

Team-CWDBy Team-CWDFebruary 24, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


A new wave of cyber-attacks using Medusa ransomware  has been linked to North Korean state-backed hackers, who continue to target the US healthcare sector despite recent indictments.

Researchers from the Symantec and Carbon Black Threat Hunter Team said the attackers deployed Medusa against a target in the Middle East and attempted, unsuccessfully, to breach a US healthcare organization.

Use of Medusa Ransomware Grows 

Medusa, operated by the Spearwing cybercrime group, emerged in 2023 as a ransomware-as-a-service (RaaS) platform.

Affiliates deploy the malware in exchange for a share of ransom payments. Since its debut, attackers using Medusa have claimed more than 366 incidents.

Analysis of Medusa’s leak site indicated that four US healthcare and non-profit organizations have been listed as victims since early November 2025.

These include a mental health non-profit and a school serving autistic children. The average ransom demand during this period stood at $260,000.

Read more on RaaS trends: Researchers Warn of New “Vect” RaaS Variant

Links with the Lazarus Group

The new activity has been attributed broadly to the Lazarus Group, a state-sponsored umbrella organization. However, it remains unclear which sub-groups of Lazarus are behind the attacks, according to Symantec. 

The Stonefly sub-group, also known as Andariel, has played a central role in ransomware operations over the past five years. Once considered focused solely on espionage, Stonefly’s involvement in financially motivated attacks became public in July 2025.

At that time, the US Justice Department indicted Rim Jong Hyok, an alleged Stonefly member, for his role in ransomware campaigns targeting US hospitals and healthcare providers. He is said to be affiliated with North Korea’s Reconnaissance General Bureau (RGB). Authorities also announced a $10m reward for information related to him.

The indictment suggested that ransomware proceeds were used to fund espionage operations against defense, technology and government entities in the US, Taiwan and South Korea. Yet subsequent investigations found continued intrusion attempts against three US organizations in October 2024, even though ransomware was not deployed.

Tools Used In Recent Campaigns

In the new advisory, researchers identified a range of malware and utilities linked to the attacks:

While the tactics resemble previous Stonefly operations, the analysts cautioned that the tools are not exclusive to one sub-group.

“The switch to Medusa demonstrates that North Korea’s rapacious involvement in cybercrime continues unabated. North Korean actors appear to have few scruples about targeting organizations in the US,” Symantec wrote.

“While some cybercrime outfits claim to steer clear of targeting healthcare organizations due to the reputational damage it may attract, Lazaurs doesn’t seem to be in any way constrained.”



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleApple Tests End-to-End Encrypted RCS Messaging in iOS 26.4 Developer Beta
Next Article Microsoft Finds “Summarize with AI” Prompts Manipulating Chatbot Recommendations
Team-CWD
  • Website

Related Posts

News

Former Defense Contractor Boss Gets 7+ Years for Selling Zero Days

February 25, 2026
News

CISA Flags Four Security Flaws Under Active Exploitation in Latest KEV Update

February 25, 2026
News

44% Surge in App Exploits as AI Speeds Up Cyber-Attacks, IBM Finds

February 25, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

How the always-on generation can level up their cybersecurity game

September 11, 2025

It’s all fun and games until someone gets hacked

September 26, 2025

How it preys on personal data – and how to stay safe

October 23, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.