Back to Intelligence

Defending Against Lazarus Group’s Medusa Ransomware: A Guide for Healthcare Providers

SA
Security Arsenal Team
March 21, 2026
5 min read

Defending Against Lazarus Group’s Medusa Ransomware: A Guide for Healthcare Providers

Introduction

The cybersecurity landscape facing the healthcare sector has intensified with recent reports linking the notorious North Korean Lazarus Group to a surge in Medusa ransomware attacks. Unlike financially motivated cybercrime, state-sponsored actors like Lazarus often combine encryption with espionage, creating a dual threat of operational disruption and data theft. For IT and security teams in healthcare, where system availability directly impacts patient safety, understanding this shift is critical. Defending against this campaign requires more than just basic antivirus; it demands a proactive posture focused on early detection and rapid containment.

Technical Analysis

Recent intelligence indicates that the Lazarus Group (APT38) has expanded its operations to leverage the Medusa ransomware variant. Medusa, typically known as a Ransomware-as-a-Service (RaaS) offering, is being utilized to target US healthcare entities aggressively.

  • The Threat Vector: Initial access often involves phishing campaigns exploiting legitimate-looking administrative credentials or exploiting unpatched external-facing services. Once inside, the operators move laterally to locate sensitive patient data and critical backup systems.
  • The Payload: Medusa operates by encrypting files on compromised systems and exfiltrating data for double-extortion leverage. It is known to create a ransom note, typically named how_to_back_files.html or !!!READ_ME_MEDUSA!!!.txt, in directories containing encrypted files.
  • Severity: The severity is heightened in the healthcare sector due to the reliance on legacy systems and the imperative of data availability. The involvement of a state-sponsored actor suggests sophisticated evasion techniques designed to bypass standard signature-based defenses.

Defensive Monitoring

To combat the Medusa ransomware and the Tactics, Techniques, and Procedures (TTPs) associated with the Lazarus Group, security teams should implement specific hunting queries. The following queries and scripts are designed to detect indicators of compromise (IOCs) and suspicious encryption behavior.

KQL Queries for Microsoft Sentinel / Defender

1. Detect Medusa Ransom Note Creation This query searches for the creation of files matching the known filenames used by Medusa ransomware.

Script / Code
DeviceFileEvents
| where ActionType == "FileCreated"
| where FileName in~ ("how_to_back_files.html", "how_to_back_files.txt", "!!!READ_ME_MEDUSA!!!.txt", "README_MEDUSA.txt")
| project Timestamp, DeviceName, InitiatingProcessAccountName, FolderPath, FileName
| extend Timestamp = utc_now()


**2. Detect Mass File Encryption Behavior**

Medusa and similar ransomware strains often encrypt files in rapid succession. This query detects processes creating a high volume of file modifications or deletions in a short time window.

Script / Code
DeviceFileEvents
| where Timestamp > ago(1h)
| where ActionType in ("FileCreated", "FileModified")
| summarize Count = count() by DeviceName, InitiatingProcessFileName, bin(Timestamp, 1m)
| where Count > 50
| project Timestamp, DeviceName, InitiatingProcessFileName, Count


**3. Identify Suspicious PowerShell Execution**

Lazarus actors often use PowerShell for lateral movement and defense evasion. This query looks for encoded commands or suspicious invocation flags.

Script / Code
DeviceProcessEvents
| where FileName =~ "powershell.exe"
| where ProcessCommandLine contains "-Enc" or ProcessCommandLine contains "-EncodedCommand"
| where ProcessCommandLine contains "DownloadString" or ProcessCommandLine contains "IEX"
| project Timestamp, DeviceName, AccountName, ProcessCommandLine

PowerShell Script for IOC Verification

Use this script on critical endpoints to scan for the presence of Medusa ransom notes. This can be deployed as a discovery script via your RMM or endpoint management tool.

Script / Code
# Scan for Medusa Ransom Notes
$Drives = Get-PSDrive -PSProvider FileSystem
$RansomNotePatterns = @("how_to_back_files.html", "how_to_back_files.txt", "!!!READ_ME_MEDUSA!!!.txt")
$Results = @()

foreach ($Drive in $Drives) {
    if (Test-Path $Drive.Root) {
        Write-Host "Scanning drive: $($Drive.Root)"
        try {
            $Files = Get-ChildItem -Path $Drive.Root -Recurse -ErrorAction SilentlyContinue | 
                     Where-Object { $RansomNotePatterns -contains $_.Name }
            
            foreach ($File in $Files) {
                $Results += [PSCustomObject]@{
                    Drive = $Drive.Root
                    FilePath = $File.FullName
                    Created = $File.CreationTime
                }
            }
        }
        catch {
            # Ignore access denied errors for system folders
        }
    }
}

if ($Results.Count -gt 0) {
    Write-Host "WARNING: Potential Medusa Ransomware activity detected!" -ForegroundColor Red
    $Results | Format-Table -AutoSize
} else {
    Write-Host "No Medusa ransom notes found." -ForegroundColor Green
}

Remediation

To protect your organization against the Lazarus Group and Medusa ransomware, implement the following remediation steps immediately:

  1. Patch and Vulnerability Management: Ensure all external-facing systems, particularly VPNs and remote access gateways, are patched with the latest security updates. Lazarus is known to exploit known CVEs quickly.

  2. Disable Unused RDP: Close Remote Desktop Protocol (RDP) ports (TCP 3389) from the internet. If access is required, enforce strict MFA and utilize a VPN or Zero Trust Network Access (ZTNA) solution.

  3. Implement Immutable Backups: Ensure you have offline or immutable backups that cannot be encrypted or deleted by threat actors. Test restoration procedures regularly to verify Business Continuity and Disaster Recovery (BCDR) plans.

  4. Network Segmentation: Segregate critical medical devices and patient data systems from the general corporate network. This limits lateral movement if a workstation is compromised.

  5. Phishing Resistance: Deploy email filtering solutions and conduct regular security awareness training, specifically focusing on recognizing credential-harvesting attempts often used by state-sponsored actors.

  6. Monitor for Exfiltration: Configure Data Loss Prevention (DLP) policies to alert on unusual volumes of data being transferred to external cloud storage or unknown IP addresses.

Related Resources

Security Arsenal Healthcare Cybersecurity AlertMonitor Platform Book a SOC Assessment healthcare Intel Hub

healthcarehipaaransomwarelazarus-groupincident-responsesoc-mdr

Is your security operations ready?

Get a free SOC assessment or see how AlertMonitor cuts through alert noise with automated triage.