North Korean state hackers seen using Medusa ransomware in attacks on US, Middle East
好的,我现在需要帮用户总结一篇文章的内容,控制在100字以内。首先,我得仔细阅读文章,理解主要信息。 文章主要讲的是朝鲜的 Lazarus 黑客组织使用 Medusa 勒索软件进行攻击。Symantec 的专家提到,Lazarus 是朝鲜军方支持的组织,他们对中东的一家公司和美国的医疗机构进行了攻击。Medusa 是以服务形式提供的勒索软件,这意味着其他团体也可以使用它,并从中分得一部分赎金。 接着,文章提到 Lazarus 之前使用过 Maui 和 Play 勒索软件,但这次是首次使用 Medusa。美国执法机构在2022年警告过 Maui 的使用情况,并在2024年对 Andariel 团队的成员 Rim Jong Hyok 发布了逮捕令。Rim 被认为是多次攻击的幕后黑手,包括针对堪萨斯州医院的攻击。 Symantec 还指出,最近的 Medusa 攻击可能也是由 Andariel 团队执行的。此外,文章提到国家支持的黑客组织与网络犯罪分子之间的协调日益增加,例如俄罗斯、中国、朝鲜和伊朗的组织开始利用勒索软件来获取经济利益或掩盖其他网络目标。 现在我需要将这些信息浓缩到100字以内。重点包括:朝鲜 Lazarus 组织使用 Medusa 勒索软件进行攻击;目标包括中东公司和美国医疗机构;Medusa 以服务形式提供;Lazarus 之前用过其他勒索软件;美国执法机构对相关人员发出逮捕令;以及国家支持的黑客与犯罪分子的合作增加。 可能还需要提到 Symantec 的发现和攻击的具体情况。但要注意字数限制,所以要简洁明了。 最终总结可能如下:朝鲜 Lazarus 黑客组织利用 Medusa 勒索软件针对中东公司和美国医疗机构发动攻击。Medusa 采用订阅模式,允许其他团体使用并分成赎金。Lazarus 曾使用 Maui 和 Play 勒索软件,此次为首次使用 Medusa。美国执法机构已对相关嫌疑人发出逮捕令,并指出国家支持的黑客与网络犯罪分子合作增多。 </think> 朝鲜 Lazarus 黑客组织利用 Medusa 勒索软件针对中东公司和美国医疗机构发动攻击。Medusa 采用订阅模式,允许其他团体使用并分成赎金。Lazarus 曾使用 Maui 和 Play 勒索软件,此次为首次使用 Medusa。美国执法机构已对相关嫌疑人发出逮捕令,并指出国家支持的黑客与网络犯罪分子合作增多。 2026-2-24 11:30:56 Author: therecord.media(查看原文) 阅读量:4 收藏

Hackers tied to one of North Korea’s most sophisticated state-backed groups have been seen deploying Medusa ransomware in financially-motivated attacks on at least two institutions. 

Cybersecurity experts at Symantec said they saw Medusa attacks launched by members of Lazarus — a well-known North Korean hacking operation housed within the country’s military — against a company in the Middle East and a healthcare organization in the U.S. 

Medusa is operated on the ransomware-as-a-service model, where affiliates can launch attacks using the malware and offer the ransomware’s developers a percentage of the ransom payment. The group emerged in 2023 and has since launched more than 350 attacks, with experts tying them to a larger cybercrime group known as Spearwing. 

Dick O’Brien, principal intelligence analyst atSymantec, noted that North Korean actors were previously seen using ransomware strains like Maui and Play, but this is the first time they had been tracked using Medusa. 

“Maui was reportedly developed by Lazarus themselves, but more recently they seem to have shifted to using ransomware-as-a-service offerings instead,” he said.

U.S. law enforcement agencies raised alarms about North Korea’s use of the Maui ransomware in 2022, warning that the hackers were using it to target U.S. hospitals and healthcare companies.

In 2024, a federal arrest warrant was issued for Rim Jong Hyok, an alleged member of the Andariel Unit within the country’s intelligence agency, the Reconnaissance General Bureau (RGB).

Rim was identified by several U.S. military agencies as the culprit behind several ransomware attacks using the Maui strain that were conducted in 2021 and 2022. At least one of the attacks targeted a hospital in Kansas, where the warrant for Rim’s arrest was issued. The attacks encrypted computers and servers used for medical testing or electronic medical records and disrupted healthcare services at facilities in Kansas, Colorado and other states

The FBI said investigators found that Rim and other Andariel actors victimized five healthcare providers, four U.S.-based defense contractors, two U.S. Air Force bases, and the National Aeronautics and Space Administration’s Office of Inspector General. 

U.S. agencies said Rim used the ransoms from the attacks to buy servers that were then used in other cyber espionage hacks against government organizations and customers in the U.S., South Korea and China.

The State Department also offered a reward of $10 million for information about Rim, who the U.S. government said was last known to be in North Korea. 

O’Brien said they could not confirm it but believed the recent ransomware attacks using Medusa were also launched by Andariel, which law enforcement agencies have said is a subgroup within Lazarus. 

Symantec said after the indictment they saw North Korean members of Andariel launch three other financially-motivated attacks in October 2024 on organizations in the U.S., although no ransomware was successfully deployed. That same month, another cybersecurity firm said it saw North Korean actors using the Play ransomware in attacks

Symantec was able to attribute the most recent Medusa attacks to North Korea due to the use of custom tools used exclusively by Lazarus, including a backdoor tool, malware and a Chrome browser password extractor. 

The report comes after multiple cybersecurity companies warned over the past two years that there is increasing coordination between nation-states and cybercriminals.

Nation-state groups from Russia, China, North Korea and Iran that were typically involved in espionage or disinformation operations are now deploying ransomware as a way to gain financially from their offensive cyber operations or to provide cover for other cyber objectives. 

Multiple ransomware gangs openly backed Russia at the onset of the Ukraine invasion and Google found former members of the notorious Conti ransomware group repurposed many of their tools for attacks on Ukrainian organizations.

In several cases, ransomware has been used as a cover for Chinese espionage activity. Law enforcement agencies have also seen instances of Iranian government hackers using their official access to later launch financially-motivated attacks as part of an effort to double-dip and moonlight as cybercriminals, monetizing their hacking skills

The FBI previously said it witnessed Iranian actors partnering with affiliates of the NoEscape, Ransomhouse and AlphV ransomware operations — eventually taking a percentage of ransom payments. 

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

Recorded Future

No previous article

No new articles

Jonathan Greig

Jonathan Greig

is a Breaking News Reporter at Recorded Future News. Jonathan has worked across the globe as a journalist since 2014. Before moving back to New York City, he worked for news outlets in South Africa, Jordan and Cambodia. He previously covered cybersecurity at ZDNet and TechRepublic.


文章来源: https://therecord.media/north-korean-hackers-using-medusa-ransomware
如有侵权请联系:admin#unsafe.sh