The main method used is phishing, according to CISA. These campaigns often impersonate legitimate organizations and trick users into clicking links that are actually malicious.
Medusa has since progressed to using an affiliate model, but the developers still control important operations such as ransom negotiation. This structure allows multiple cybercriminal groups to launch Medusa attacks while sharing profits with the original developers.
Since 2021, the ransomware-as-a-service provider has used phishing and other common ransomware techniques.
Since February 2025, Medusa, a "ransomware-as-a-service variant used to conduct ransomware attacks," has claimed over 300 victims.
Medusa developers and affiliates use a double extortion model, where they “encrypt victim data and threaten to publicly release exfiltrated data if a ransom is not paid.” This pressures victims into paying even if they have backups in order to prevent public exposure.
Medusa actors exploit unpatched software vulnerabilities to break into networks across many different industries. Keeping software updated is crucial, as attackers frequently target outdated systems.
According to warnings from multiple government agencies, a ransomware program has taken hundreds of victims' data hostage in exchange for a ransom.
The FBI and US Cybersecurity and Infrastructure Security Agency are warning the world about the dangers of ransomware schemes, like Medusa.
There is a data-leak website run by Medusa that shows its victims and a countdown to the release of private information.
Critical sectors have been targeted, including medical, educational, and legal organizations. This has led to significant financial losses.
If you're using webmail services such as Gmail or Microsoft Outlook or even VPNs, you should start using multifactor authentication. MFAs significantly reduce the risk of unauthorized entry.
Medusa originally started as a closed ransomware variant. However, over the years, it has become a broader criminal enterprise.
Ransoms are demanded and posted on the site including direct links to Medusa-affiliated cryptocurrency wallets. The victims can pay US$10,000 in cryptocurrency to add time to the countdown timer.
Use long, unique passwords combined with multifactor authentication as it can add an extra layer of protection against credential theft. A password manager can help users generate and store complex passwords securely.
If your software isn't updated it can be exposed to more vulnerabilities. It's important to make sure operating systems and software are properly patched and up to date.
Experts warn against frequently recurring passwords as this can weaken security. Instead, you should have a unique password that is only changed when a breach is suspected.
Officials recommended patching operating systems, software, and firmware and using multifactor authentication to protect against ransomware.
Organizations specifically should store copies of more sensitive or crucial information on separate, physical devices and place them in extremely secure locations.
Other steps for an organization might include segmenting networks as well as requiring a VPN for remote access.
VPNs can help reduce the risk of unauthorized access and can enhance security overall.
If you open an email attachment, click an ad, follow a link, or even visit a website embedded with malware, you may unknowingly be infected.
Normally, you won't realize your computer has been infected until it's too late. You may go to login and no longer have access to your data.
Additionally, paying ransoms incentivizes cybercriminals to continue their operations.
Ransomware attacks can be costly to businesses and individuals alike as it targets important information and data.
Keep operating systems, software, and applications up to date. Ensure anti-virus and anti-malware solutions are set to automatically update and run regular scans.
Sources: (People) (FBI) (Britannica) (Fortune) (AL.com)
See also: Elon Musk suggests Ukraine is behind 'massive cyber-attack' causing X disruptions
The FBI, CISA, and MS-ISAC "Do not encourage paying ransoms as payment does not guarantee victim files will be recovered."
Ransomware attacks pose an ever-increasing threat to businesses, organizations, and individuals alike. Cybercriminals are using evolving and sophisticated methods to infiltrate systems. One of the latest and most dangerous ransomware variants, Medusa, has already targeted hundreds of victims. Government agencies such as the FBI and CISA are warning against this threat and emphasizing the importance of proactive defense measures.
Curious how you can stay safe from ransomware? Click through now.
To protect yourself and avoid being exposed to ransomware or other malware, be cautious and avoid downloading software from unknown sources.
Whether you run a business or it's for your family, create a plan just in case you are ever a victim of a ransomware attack.
If you live in the US and believe or know you're a victim, report ransomware attacks to ic3.gov, the FBI’s Internet Crime Complaint Center. Provide details of the attack as it helps authorities track ransomware groups and prevent future incidents.
How to protect yourself from data stealing and ransom requests
What is ransomware?
LIFESTYLE Technology
Ransomware attacks pose an ever-increasing threat to businesses, organizations, and individuals alike. Cybercriminals are using evolving and sophisticated methods to infiltrate systems so they can then encrypt the data of the organization, business, or individual, essentially locking them out of their own devices. The victims must pay the ransom request to have their data returned to them.
One of the latest and most dangerous ransomware variants, Medusa, has already targeted hundreds of victims. Government agencies such as the FBI and CISA are warning against this threat and emphasizing the importance of proactive defense measures.
Curious about how you can stay safe from ransomware? Click through now.