Back to Intelligence

Lazarus Group Deploys Medusa Ransomware in Alarming Shift Against US Healthcare

SA
Security Arsenal Team
March 12, 2026
5 min read

The State-Sponsored Evolution: Lazarus Group Embraces Medusa Ransomware

The cyber threat landscape facing the healthcare sector has just become significantly more perilous. For years, industry watchers have associated the North Korean state-sponsored group Lazarus with high-stakes financial heists and supply chain attacks. However, recent intelligence confirms a strategic pivot: Lazarus is now actively deploying Medusa ransomware against US healthcare providers.

This isn't just another criminal operation looking for a quick payout; it represents the convergence of nation-state resources with the "hack-and-leak" tactics of cybercrime. For healthcare CISOs and security teams, this means the adversary on the other side of the firewall is better funded, more patient, and more dangerous than ever.

The Anatomy of the Threat

Medusa ransomware has operated as a Ransomware-as-a-Service (RaaS) model for some time, but its adoption by Lazarus changes the profile of the attacker. This alliance suggests that Lazarus is outsourcing its encryption capabilities to focus on what they do best: initial access and lateral movement.

Tactical, Technical, and Procedures (TTPs)

Unlike standard cybercriminal gangs who spray-and-pray with phishing emails, Lazarus typically gains access through more sophisticated means:

  1. Initial Access: Expect to see spear-phishing campaigns targeting IT personnel, researchers, or contractors, often masquerading as job offers or industry recruitment.
  2. Lateral Movement: Once inside, they leverage Living-off-the-Land (LotL) binaries. They are fond of using legitimate administrative tools to blend in with normal traffic.
  3. Defense Evasion: The group actively disables security solutions and clears logs to hinder forensics.
  4. Impact: The deployment of Medusa involves the encryption of sensitive patient data and the exfiltration of records for double extortion.

The most concerning aspect for healthcare providers is the use of CVE-2023-** (generalized vulnerability exploitation) and unsecured RDP ports. Lazarus is known to scan for exposed remote services aggressively.

Threat Hunting and Detection

To catch this adversary before encryption begins, security teams must move beyond signature-based detection. We need to hunt for the behaviors that precede the Medusa payload deployment.

KQL Queries (Microsoft Sentinel / Defender)

Use the following KQL query to detect suspicious PowerShell activity often associated with Lazarus preparing the environment for ransomware. This looks for the combination of obfuscation and backup deletion commands.

Script / Code
DeviceProcessEvents  
| where Timestamp > ago(7d)  
| where InitiatingProcessFileName in ("powershell.exe", "cmd.exe", "pwsh.exe")  
| where ProcessCommandLine has "FromBase64String" or ProcessCommandLine has "-enc"  
| join kind=inner (  
    DeviceProcessEvents  
    | where FileName in ("vssadmin.exe", "wbadmin.exe", "bcdedit.exe")  
    | where ProcessCommandLine has "delete" or ProcessCommandLine has "shadowcopy"  
) on DeviceId  
| project Timestamp, DeviceName, AccountName, InitiatingProcessCommandLine, ProcessCommandLine  
| order by Timestamp desc

PowerShell Hunting Script

Run this script on critical endpoints to check for the presence of Medusa ransom notes or specific file extensions associated with the ongoing campaign.

Script / Code
# Hunt for Medusa Indicators of Compromise
$paths = @("C:\", "D:\", "E:\")
$patterns = @("*README*.*.txt", "*HOW_TO_RESTORE*.*.txt", "*.medusa")

foreach ($path in $paths) {
    if (Test-Path $path) {
        Write-Host "Scanning $path..." -ForegroundColor Cyan
        foreach ($pattern in $patterns) {
            $files = Get-ChildItem -Path $path -Filter $pattern -Recurse -ErrorAction SilentlyContinue -Force
            if ($files) {
                foreach ($file in $files) {
                    Write-Host "[ALERT] Suspicious file found: $($file.FullName)" -ForegroundColor Red
                    Write-Host "Created: $($file.CreationTime) | Modified: $($file.LastWriteTime)"
                }
            }
        }
    }
}

Bash Audit Script (Linux Servers)

Many healthcare environments run Linux for EMR databases or imaging storage (PACS). Use this bash snippet to check for recent mass file modifications or suspicious process spawns.

Script / Code
#!/bin/bash

# Check for processes with names commonly associated with Medusa/Ransomware execution
echo "Checking for suspicious processes..."
ps aux | grep -E '(medusa|crypt|lock|encrypt)' | grep -v grep

# Check for recently modified files in common data directories (last 24 hours)
echo "Checking for recent file modifications in /var/www or /data..."
find /var/www /data -type f -mtime -1 2>/dev/null | head -n 20

# Check for ransom notes in common locations
echo "Searching for ransom notes..."
find / -maxdepth 4 -iname "*README*" -o -iname "*RECOVER*" 2>/dev/null

Strategic Mitigation

Detecting Lazarus is difficult; stopping them requires a layered defense. Given the healthcare context, availability is paramount, but security cannot be compromised.

  1. Rigorous Patch Management: The Medusa ransomware often exploits known vulnerabilities in legacy systems common in hospitals. Prioritize patching critical remote access vulnerabilities immediately.
  2. Network Segmentation: Ensure that IoT medical devices and patient records are on separate VLANs. Lazarus moves laterally; if they get into a nurse's station, they should not be able to reach the PACS server.
  3. Disable RDP on Internet-Facing Assets: If Remote Desktop Protocol is required, it must be behind a VPN and protected by Multi-Factor Authentication (MFA). Exposing RDP to the open web is an open invitation to Lazarus.
  4. Offline Backups: The only sure defense against Medusa is a backup that cannot be encrypted. Implement immutable, offline backups for critical patient data systems.

Conclusion

The partnership between the Lazarus Group and the Medusa ransomware operation signals a "professionalization" of state-sponsored cybercrime. Healthcare providers are no longer just collateral damage; they are primary targets. By implementing the threat hunts and mitigations above, you can shift the odds back in your favor.


Related Resources

Security Arsenal Healthcare Cybersecurity AlertMonitor Platform Book a SOC Assessment healthcare Intel Hub

healthcarehipaaransomwarelazarus-groupmedusa-ransomwarehealthcare-securityaptthreat-hunting

Is your security operations ready?

Get a free SOC assessment or see how AlertMonitor cuts through alert noise with automated triage.