North Korean Lazarus group linked to Medusa ransomware attacks
嗯,用户让我帮忙总结一篇文章,控制在100字以内,而且不需要特定的开头。首先,我需要通读整篇文章,抓住主要信息。 文章讲的是朝鲜支持的黑客组织Lazarus利用Medusa勒索软件攻击美国的医疗机构。Medusa从2021年出现,影响了300多个组织,最近又增加了80个受害者。Lazarus之前也用过其他勒索软件,但这次是第一次和Medusa关联。Symantec报告指出,他们可能使用了Andariel/Stonefly小组,并且工具包显示与另一个朝鲜组织Diamond Sleet有关联。攻击工具包括一些常见的恶意软件,如ChromeStealer和Mimikatz。赎金平均26万美元,最高1500万。资金用于间谍活动针对美国、台湾和韩国的国防、科技和政府机构。 总结时要涵盖:朝鲜黑客、Medusa勒索软件、攻击美国医疗机构、影响范围、赎金数额以及资金用途。确保在100字以内,并且直接描述内容。 </think> 朝鲜支持的黑客组织Lazarus利用Medusa勒索软件攻击美国医疗机构,自2021年起已影响300多个组织,并于近期新增80名受害者。该组织首次与Medusa关联,赎金平均26万美元,最高达1500万。资金用于针对美、台、韩等国的间谍活动。 2026-2-24 11:15:27 Author: www.bleepingcomputer.com(查看原文) 阅读量:3 收藏

North Korean Lazarus group linked to Medusa ransomware attacks

North Korean state-backed hackers associated with the Lazarus threat group are targeting U.S. healthcare organizations in extortion attacks using the Medusa ransomware.

The Medusa ransomware-as-a-service (RaaS) operation emerged in January 2021, and by February 2025, it impacted over 300 organizations in various critical infrastructure sectors. Since then, the gang claimed at least another 80 victims.

North Korean threat actors have previously been linked to other ransomware strains such as HolyGhost, PLAY, Maui, Qilin, as well as other malware families. However, this is the first time security researchers have associated the actor with Medusa.

Wiz

In a report today, enterprise cybersecurity company Symantec says that a Lazarus subgroup, possibly Andariel/Stonefly, is now using Medusa in financially-motivated cyberattacks targeting U.S. healthcare providers.

According to the researchers, the toolset used in these attacks also shows some association with Diamond Sleet, another North Korean group that typically targets media, defense, and IT industries.

However, some of the utilities seen in the Medusa ransomware attacks are commodity tools:

  • Comebacker – Diamond Sleet-linked backdoor/loader (seen used by Diamond Sleet)
  • Blindingcan – Remote access trojan
  • ChromeStealer – Chrome credential extractor
  • Infohook – Information stealer
  • Mimikatz – Credential dumping tool
  • RP_Proxy – Custom proxy tool
  • Curl – Data transfer tool

The researchers comment that no sectors are off-limits for North Korean hackers, who keep getting involved in cybercrime for financial gain.

“While some cybercrime outfits claim to steer clear of targeting healthcare organizations due to the reputational damage it may attract, Lazaurs doesn’t seem to be in any way constrained,” Symantec researchers say.

Medusa targeted multiple healthcare and non-profit organizations in the U.S., as the gang's data leak site lists four such victims since the beginning of November 2025, among them an educational facility for autistic children.

Not all these Medusa attacks can be confidently attributed to Lazarus hackers, though. Medusa can demand ransoms as large as $15 million, but Symantec researchers say that the average is around $260,000.

Stolen funds are used to support espionage operations against entities in the defense, technology, and government sectors in the U.S., Taiwan, and South Korea.

Symantec has provided a set of indicators of compromise (IoCs) in its report, which include network infrastructure data and hashes for the malware used in attacks.

tines

The future of IT infrastructure is here

Modern IT infrastructure moves faster than manual workflows can handle.

In this new Tines guide, learn how your team can reduce hidden manual delays, improve reliability through automated response, and build and scale intelligent workflows on top of tools you already use.


文章来源: https://www.bleepingcomputer.com/news/security/north-korean-lazarus-group-linked-to-medusa-ransomware-attacks/
如有侵权请联系:admin#unsafe.sh