Today's cybersecurity headlines are brought to you by ThreatPerspective


Ethical Hacking News

The Lazarus Group's Latest Malicious Venture: Medusa Ransomware Attacks on US Healthcare Organizations




The Lazarus Group's latest malicious venture has seen North Korean-backed hackers targeting U.S. healthcare organizations in a series of extortion attacks utilizing the Medusa ransomware-as-a-service (RaaS) operation. This latest development underscores the evolving landscape of global cyber threats and highlights the ongoing cat-and-mouse game between threat actors and those seeking to protect sensitive information.

  • North Korean-backed hackers associated with the Lazarus threat group have launched a series of extortion attacks on U.S. healthcare organizations using the Medusa ransomware-as-a-service (RaaS) operation.
  • The Medusa RaaS operation has been linked to over 300 organizations impacted since its inception and claims at least another 80 victims, solidifying its position as a force in the world of ransomware.
  • The Lazarus Group's involvement in the Medusa RaaS operation marks their first direct association with this particular malware family.
  • The average ransom demanded by Medusa attackers totals around $260,000, although some instances have seen demands as high as $15 million.
  • The scope of the threat extends beyond initial attacks, with stolen funds supporting espionage operations against entities in defense, technology, and government sectors in the U.S., Taiwan, and South Korea.
  • Symantec has provided a set of indicators of compromise (IoCs) to aid organizations in detecting and mitigating Medusa RaaS operations.
  • The adaptable nature of Lazarus Group's threat actors is highlighted by their use of commodity tools such as Comebacker, Blindingcan, and ChromeStealer.



  • In a recent surge of malicious activity, North Korean-backed hackers associated with the Lazarus threat group have turned their attention to U.S. healthcare organizations in a series of extortion attacks utilizing the Medusa ransomware-as-a-service (RaaS) operation. This latest development underscores the evolving landscape of global cyber threats and highlights the ongoing cat-and-mouse game between threat actors and those seeking to protect sensitive information.

    The Medusa RaaS operation, which emerged in January 2021, has been linked to a significant number of attacks on various critical infrastructure sectors, with over 300 organizations impacted since its inception. By February 2025, the gang had claimed at least another 80 victims, further solidifying their position as a force to be reckoned with in the world of ransomware.

    The Lazarus Group's involvement in the Medusa RaaS operation is significant, as it marks the first time that North Korean threat actors have been directly associated with this particular malware family. The group has previously been linked to other strains of ransomware, including HolyGhost, PLAY, Maui, and Qilin, as well as various other malware families.

    While the Lazarus Group's motivations for engaging in these attacks are not entirely clear, it is evident that they are driven by a desire for financial gain. According to Symantec researchers, the average ransom demanded by Medusa attackers totals around $260,000, although some instances have seen demands as high as $15 million.

    The scope of the threat posed by the Medusa RaaS operation extends beyond the initial attacks themselves, with stolen funds being used to support espionage operations against entities in the defense, technology, and government sectors in the U.S., Taiwan, and South Korea. This highlights the broader implications of these types of attacks, which can have far-reaching consequences for national security.

    Symantec has provided a set of indicators of compromise (IoCs) in their report, including network infrastructure data and hashes for the malware used in attacks. These tools will be essential for organizations seeking to detect and mitigate the impact of Medusa RaaS operations.

    The use of commodity tools such as Comebacker, Blindingcan, ChromeStealer, Infohook, Mimikatz, RP_Proxy, and Curl by the Lazarus Group's threat actors underscores the adaptable nature of these groups. While some tools are directly linked to other known North Korean groups, such as Diamond Sleet, others appear to be commodity tools with no discernible origin.

    The association of the Medusa RaaS operation with the Lazarus Group serves as a stark reminder that no sector is off-limits for North Korean hackers. These groups have consistently demonstrated an ability to target a wide range of organizations and industries, leveraging various tactics and techniques in their pursuit of financial gain.

    As such, it is essential that organizations take proactive measures to protect themselves against the types of attacks seen with the Medusa RaaS operation. This may involve implementing robust security protocols, conducting regular threat assessments, and staying informed about emerging threats.

    In conclusion, the Lazarus Group's involvement in the Medusa RaaS operation represents a significant escalation in their malicious activities. The use of this ransomware-as-a-service highlights the adaptability and persistence of these groups, as well as their willingness to engage with a wide range of organizations across different sectors.

    The Medusa RaaS operation serves as a warning to those seeking to protect sensitive information: no organization is immune to the threat posed by Lazarus Group-backed hackers. As such, it is essential that organizations remain vigilant and proactive in their efforts to detect and mitigate the impact of these types of attacks.



    Related Information:
  • https://www.ethicalhackingnews.com/articles/The-Lazarus-Groups-Latest-Malicious-Venture-Medusa-Ransomware-Attacks-on-US-Healthcare-Organizations-ehn.shtml

  • Published: Tue Feb 24 07:17:38 2026 by llama3.2 3B Q4_K_M













    © Ethical Hacking News . All rights reserved.

    Privacy | Terms of Use | Contact Us