Cybersecurity Advisory

The Federal Bureau of Investigation (FBI), Cybersecurity and Infrastructure Security Agency (CISA), and the Multi-State Information Sharing and Analysis Center (MS-ISAC) has released a joint advisory to disseminate known Medusa ransomware tactics, techniques, and procedures (TTPs) identified through FBI investigations as recently as February 2025.

Medusa is a ransomware-as-a-service (RaaS) variant. Medusa developers and affiliates have impacted over 3000 victims from a variety of critical infrastructure sectors with affected industries including medical, education, legal, insurance, technology, and manufacturing. The Medusa ransomware variant is unrelated to the MedusaLocker variant and the Medusa mobile malware variant per the FBI’s investigation.  

 

The following recommendations are put in place to reduce the likelihood and impact of Medusa ransomware incidents:

  • Implement a recovery plan to maintain and retain multiple copies of sensitive or proprietary data and servers in a physically separate, segmented, and secure location (e.g., hard drive, storage device, the cloud)

  • Require all accounts with password logins (e.g., service accounts, admin accounts, and domain admin accounts) to comply with NIST’s standards. In particular, require employees to use long passwords and consider not requiring frequently recurring password changes, as these can weaken security.

  • Require multifactor authentications for all services to the extent possible, particularly for webmail, virtual private networks, and accounts that access critical systems.

  • Keep all operating systems, software, and firmware up to date. Timely patching is one of the most efficient and cost-effective steps an organization can take to minimize its exposure to cybersecurity threats. Prioritize patching known exploited vulnerabilities in internet-facing systems [CPG 1.E].

  • Segment networks to prevent the spread of ransomware. Network segmentation can help prevent the spread of ransomware by controlling traffic flows between—and access to—various subnetworks and by restricting adversary lateral movement [CPG 2.F].

  • Identify, detect, and investigate abnormal activity and potential traversal of the indicated ransomware with a networking monitoring tool. To aid in detecting the ransomware, implement a tool that logs and reports all network traffic, including lateral movement activity on a network. Endpoint detection and response (EDR) tools are particularly useful for detecting lateral connections as they have insight into common and uncommon network connections for each host.

  • Require VPNs or Jump Hosts for remote access.

  • Monitor for unauthorized scanning and access attempts.

  • Filter network traffic by preventing unknown or untrusted origins from accessing remote services on internal systems. This prevents threat actors from directly connecting to remote access services that they have established for persistence.

  • Audit user accounts with administrative privileges and configure access controls according to the principle of least privilege.

  • Review domain controllers, servers, workstations, and active directories for new and/or unrecognized accounts.

  • Disable command-line and scripting activities and permissions. Privilege escalation and lateral movement often depend on software utilities running from the command line. If threat actors are not able to run these tools, they will have difficulty escalating privileges and/or moving laterally

  • Disable unused ports

  • Maintain offline backups of data and regularly maintain backup and restoration. By instituting this practice, the organization helps ensure they will not be severely interrupted and/or only have irretrievable data.

  • Ensure all backup data is encrypted, immutable (i.e., cannot be altered or deleted), and covers the entire organization’s data infrastructure

Previous
Previous

SOC-as-a-Service (SOCaaS) Market Set to Double by 2030: Key Trends and Insights

Next
Next

The Growing Importance of Security Automation in Managed Services