Back to Intelligence

Lazarus Group Adopts Medusa Ransomware: A Critical Threat to US Healthcare

SA
Security Arsenal Team
February 24, 2026
5 min read

Lazarus Group Adopts Medusa Ransomware: A Critical Threat to US Healthcare

The cybersecurity landscape has shifted dramatically with the confirmation that the notorious North Korean state-sponsored group, Lazarus, is actively expanding its operations into the ransomware ecosystem. Historically associated with espionage and cryptocurrency heists, Lazarus is now leveraging the Medusa ransomware variant to target critical infrastructure, with a sharp focus on the US healthcare sector.

For healthcare providers already grappling with resource constraints and legacy systems, this convergence of state-level capabilities and financially motivated tactics presents a severe risk. This post analyzes the threat, provides detection mechanisms, and outlines actionable mitigation steps.

The Evolution of the Threat

While North Korean actors have long utilized cybercrime to fund regime activities—most notably through the theft of billions in cryptocurrency—their direct deployment of established ransomware payloads marks a tactical evolution. By adopting or mimicking the Medusa ransomware builder, Lazarus gains two advantages: the immediate financial pressure of double-extortion (encrypting data + threatening leaks) and a degree of plausible deniability regarding attribution.

Why Healthcare?

The healthcare sector remains a prime target due to the high sensitivity of patient data and the critical nature of medical services. Attackers know that downtime in a hospital environment directly impacts patient care, creating immense pressure to pay ransoms quickly. Medusa’s tactics typically involve aggressive exfiltration prior to encryption, ensuring that even if backups exist, the organization faces regulatory and reputational ruin if data is leaked.

Technical Analysis and TTPs

Medusa ransomware is written in C++ and acts as a typical crypto-locker, but recent variants linked to Lazarus activity show distinct integration with sophisticated Initial Access vectors. The campaign typically follows this progression:

  1. Initial Access: Phishing campaigns with malicious attachments or exploitation of exposed remote services (RDP/VPN). In some cases, Lazarus has been known to supply chain attacks, though Medusa specifically relies heavily on valid credentials purchased on the dark web or harvested via infostealers.
  2. Execution & Privilege Escalation: Upon gaining a foothold, actors use living-off-the-land (LotL) binaries to move laterally. Tools like PsExec or modified PowerShell scripts are used to deploy the payload across the network.
  3. Impact: The ransomware encrypts files and appends specific extensions (often .MEDUSA or similar, though configurable). It modifies the Windows wallpaper to leave a ransom note.

Key CVEs and Vulnerabilities

While Medusa itself is a pure malware payload, the entry points often involve unpatched vulnerabilities in remote access infrastructure. SOC teams should prioritize patching known exploits in VPN appliances (Fortinet, Pulse Secure, etc.) and ensuring strict RDP configurations.

Detection and Threat Hunting

To identify potential Medusa activity within your environment, security teams should hunt for mass file encryption events and the specific process behaviors associated with this strain. Below are queries for Microsoft Sentinel/Defender and PowerShell to aid in detection.

KQL Query (Sentinel/Defender)

This query looks for the rapid creation of files with the .medusa extension or the execution of processes commonly associated with Medusa’s encryption routine.

Script / Code
let ProcessList = dynamic(["medusa", "locker", "enc"]);
DeviceProcessEvents
| where Timestamp > ago(7d)
| where FileName has_any (ProcessList) 
   or ProcessCommandLine has ".medusa"
   or ProcessCommandLine has "-encrypt"
| project Timestamp, DeviceName, InitiatingProcessAccountName, FileName, ProcessCommandLine, FolderPath
| join kind=inner (DeviceFileEvents
| where FileName endswith ".medusa" or SHA256 has_any (ProcessList)
| project Timestamp, DeviceName, FileName, FolderPath) on DeviceName, Timestamp
| distinct Timestamp, DeviceName, FileName, ProcessCommandLine

PowerShell Hunting Script

This script scans a specific directory (e.g., a shared drive) for files recently modified or created with the suspected Medusa extension pattern.

Script / Code
# Hunting for Medusa Ransomware Indicators
$TargetPath = "C:\Shares\PatientData" # Adjust to your environment
$TimeFrame = (Get-Date).AddHours(-24)

Write-Host "Scanning $TargetPath for indicators of Medusa ransomware..."

$SuspectFiles = Get-ChildItem -Path $TargetPath -Recurse -ErrorAction SilentlyContinue | 
    Where-Object { $_.LastWriteTime -gt $TimeFrame -and $_.Extension -match "\.medusa" }

if ($SuspectFiles) {
    Write-Warning "Potential Medusa Encryption Detected!"
    $SuspectFiles | Select-Object FullName, LastWriteTime, Length | Format-Table -AutoSize
} else {
    Write-Host "No immediate indicators found in the last 24 hours."
}

Mitigation Strategies

Defending against a state-sponsored actor wielding ransomware requires a layered defense:

  • Network Segmentation: Ensure that critical medical devices and patient record systems (EHR) are isolated from general admin networks. This impedes lateral movement.
  • Disable Unnecessary RDP: Attackers frequently exploit RDP. If remote access is required, enforce MFA and utilize a VPN or Zero Trust Network Access (ZTNA) solution rather than exposing RDP directly to the internet.
  • Offline Backups: Maintain immutable, offline backups. In the event of a Medusa infection, these are your only guarantee of recovery without paying the ransom.
  • Phishing Resilience: Conduct regular security awareness training. Since initial access is often credential-based, users are the last line of defense against credential harvesting.

Conclusion

The involvement of the Lazarus Group in Medusa ransomware operations signals a troubling escalation. Healthcare organizations must move beyond simple compliance checks and assume active targeting. By deploying the hunting queries above and rigorously enforcing network segmentation, you can significantly reduce the attack surface.

Related Resources

Security Arsenal Healthcare Cybersecurity AlertMonitor Platform Book a SOC Assessment healthcare Intel Hub

healthcarehipaaransomwarelazarus-groupmedusa-ransomwarehealthcare-securitythreat-huntingapt

Is your security operations ready?

Get a free SOC assessment or see how AlertMonitor cuts through alert noise with automated triage.