资讯
Takes you closer to the games, movies and TV you love ...
The Medusa ransomware-as-a-service (RaaS) claims to have compromised the computer systems of NASCAR, the United States' National Association for Stock Car Auto Racing, and made off with more than 1TB ...
"As of February 2025, Medusa developers and affiliates have impacted over 300 victims from a variety of critical infrastructure sectors with affected industries including medical, education, legal ...
Then they send a scary pop-up to the victim's screen. "They reach out to you, and they say, hey, you know, you pay X, Y, and Z. And we will not exploit you.
But even before the countdown ends, Medusa will promote the sale of the stolen data to interested buyers. Victims can pay $10,000 in cryptocurrency to add another day to the timer.
How can I protect myself and my company from Medusa? The advisory posted on the CISA’s website states that Medusa is primarily spread through phishing campaigns to steal victims’ credentials.
Originally, Medusa operated as a closed ransomware variant where all development and associated operations were controlled by the same group of cyber threat actors. It has since shifted toward an ...
Medusa "actors" (developers and affiliates) collect sensitive personal information (i.e., bank account details, health records, social security numbers) and threaten to release it.
Medusa Ransomware Strikes 300+ Targets: FBI & CISA Urge Immediate Action to #StopRansomware Your email has been sent Medusa ransomware now operates as a RaaS model, recruiting affiliates from ...
Medusa is a ransomware-as-a-service software that uses phishing campaigns to steal victims' credentials and exploit unpatched software vulnerabilities, according to the CISA.
Following a successful attack, the victim’s files are encrypted and appended the .medusa extension, a ransom note is dropped on the system, and the Medusa ransomware is deleted. The group demands that ...
The threat actors behind the Medusa ransomware have claimed nearly 400 victims since it first emerged in January 2023, with the financially motivated attacks witnessing a 42% increase between 2023 and ...
一些您可能无法访问的结果已被隐去。
显示无法访问的结果