Back to Intelligence

Lazarus Group Weaponizes Medusa Ransomware: Healthcare Sector on High Alert

SA
Security Arsenal Team
February 24, 2026
5 min read

Lazarus Group Weaponizes Medusa Ransomware: Healthcare Sector on High Alert

In a troubling escalation of cyber warfare, the notorious North Korea-linked Lazarus Group (also tracked as Diamond Sleet or Pompilus) has been observed deploying Medusa ransomware in active campaigns. According to recent intelligence from Broadcom’s Symantec and Carbon Black Threat Hunter Team, this state-sponsored actor is pivoting its focus toward high-value targets in the Middle East and the U.S. healthcare sector.

While the group successfully struck an unnamed entity in the Middle East, their attempted breach of a U.S. healthcare organization was fortunately thwarted. However, this activity signals a dangerous shift in tactics, techniques, and procedures (TTPs) that CISOs—particularly in healthcare—must address immediately.

Analysis: The Fusion of State-Sponsored Capability and Ransomware

Historically, Lazarus Group has prioritized financial espionage and cryptocurrency heists to fund state operations. Their adoption of Medusa ransomware represents a diversification into "pure" extortion. Medusa, known for its aggressive double-extortion tactics (encrypting data while threatening to leak it), provides the group with a faster path to liquidity than complex supply chain attacks.

Key Observations

  • Target Diversification: By targeting the healthcare sector, the group is betting on the high pressure to restore patient services to force rapid ransom payments.
  • Unsuccessful Healthcare Attack: The report notes a failed attack on a U.S. healthcare provider. This suggests that while initial access may have been achieved (likely via phishing or vulnerability exploitation), detection mechanisms or endpoint controls prevented the payload from executing.
  • Geopolitical Implications: The simultaneous targeting of a Middle East entity alongside a U.S. target aligns with broader geopolitical objectives, potentially serving as a test bed for disruptive capabilities.

Attack Vectors & TTPs

Lazarus typically gains initial access through:

  1. Phishing: Spear-phishing emails containing malicious attachments or links.
  2. Exploitation of Public-Facing Applications: Leveraging unpatched vulnerabilities in VPNs or remote access services.
  3. Living off the Land (LotL): Using legitimate system administration tools (like PowerShell or WMI) to move laterally and evade detection before deploying the ransomware payload.

Detection and Threat Hunting

To defend against this convergence of APT tactics and ransomware payloads, organizations must move beyond signature-based detection. Below are queries and scripts designed to hunt for indicators of Medusa ransomware and Lazarus Group activity.

KQL Query for Microsoft Sentinel/Defender

This query searches for process creation patterns associated with Medusa and common lateral movement tools used by Lazarus.

Script / Code
DeviceProcessEvents
| where Timestamp > ago(7d)
// Look for Medusa specific file extensions or process names
| where FileName has_any ("medusa", "lock", "encrypt") 
   or ProcessCommandLine has_any ("-enc", "-lock", "vssadmin delete shadows")
// Correlate with network connections often used by ransomware for C2 or exfiltration
| join kind=inner (DeviceNetworkEvents 
    | where Timestamp > ago(7d) 
    | where RemotePort in (443, 80) 
    | summarize arg_max(Timestamp, *) by DeviceId
    ) on DeviceId
| project Timestamp, DeviceName, FileName, ProcessCommandLine, InitiatingProcessFileName, RemoteUrl
| summarize Count() by DeviceName, FileName
| order by Count() desc

PowerShell Script for Endpoint Audit

This script checks for the presence of suspicious mutexes or file modifications typical of Medusa infections.

Script / Code
<#
.SYNOPSIS
    Checks for Medusa Ransomware indicators on the local system.
.DESCRIPTION
    Scans specific directories for ransomware notes and checks for suspicious process activity.
#>

$RansomNotePattern = "*README*.*"
$SuspiciousProcesses = @("rundll32.exe", "powershell.exe", "cmd.exe")

Write-Host "[+] Scanning for ransomware notes..."
$UserDir = [Environment]::GetFolderPath("UserProfile")
$Notes = Get-ChildItem -Path $UserDir -Filter $RansomNotePattern -Recurse -ErrorAction SilentlyContinue

if ($Notes) {
    Write-Host "[!] WARNING: Potential ransom notes found:" -ForegroundColor Red
    $Notes | Select-Object FullName
} else {
    Write-Host "[-] No ransom notes found in user directories." -ForegroundColor Green
}

Write-Host "[+] Checking for high-risk process executions..."
$Events = Get-WinEvent -LogName Security -FilterXPath "*[System[(EventID=4688)]] and *[EventData[Data[@Name='NewProcessName']]]" -MaxEvents 100 -ErrorAction SilentlyContinue

if ($Events) {
    foreach ($Event in $Events) {
        $ProcessName = $Event.Properties[5].Value
        if ($SuspiciousProcesses -contains (Split-Path $ProcessName -Leaf)) {
            Write-Host "[!] Suspicious execution detected: $ProcessName" -ForegroundColor Yellow
        }
    }
}

Python IOC Scanner

A simple utility to scan a directory for known Medusa file hashes (placeholders used for example).

Script / Code
import os
import hashlib

# Placeholder IOCs (Replace with actual threat intel hashes)
MEDUSA_Iocs = [
    "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855",
    "fa988ca8a0435b8dc596e7328d6f5e2c5a5c5c5c5c5c5c5c5c5c5c5c5c5c5"
]

def get_file_hash(filepath):
    sha256_hash = hashlib.sha256()
    with open(filepath, "rb") as f:
        for byte_block in iter(lambda: f.read(4096), b""):
            sha256_hash.update(byte_block)
    return sha256_hash.hexdigest()

def scan_directory(directory):
    print(f"[*] Scanning {directory}...")
    for root, dirs, files in os.walk(directory):
        for file in files:
            file_path = os.path.join(root, file)
            try:
                file_hash = get_file_hash(file_path)
                if file_hash in MEDUSA_Iocs:
                    print(f"[!] THREAT DETECTED: {file_path} matches known Medusa hash.")
            except Exception as e:
                pass

if __name__ == "__main__":
    scan_directory("C:\\Temp") # Change to target directory

Mitigation Strategies

Detecting Lazarus requires a layered defense. Based on this report, Security Arsenal recommends the following immediate actions:

  1. Patch External Attack Surfaces: Immediately patch VPN concentrators and remote access gateways. Lazarus frequently exploits known CVEs (e.g., VPN vulnerabilities) to gain an initial foothold.
  2. Implement Phishing-Resistant MFA: Ensure multi-factor authentication is enforced for all remote access and email systems. Attackers often steal credentials to bypass perimeter defenses.
  3. Disable Unnecessary Protocols: Review and restrict the use of RDP and SMB across the network. Segment critical medical records systems from general administrative networks to limit lateral movement.
  4. 24/7 SOC Monitoring: The "unsuccessful" attack on the U.S. healthcare provider highlights the value of rapid detection. Ensure your SOC is tuned to detect the "LotL" techniques that precede ransomware deployment.

Related Resources

Security Arsenal Healthcare Cybersecurity AlertMonitor Platform Book a SOC Assessment healthcare Intel Hub

healthcarehipaaransomwarelazarus-grouphealthcare-securitythreat-huntingapt38medusa

Is your security operations ready?

Get a free SOC assessment or see how AlertMonitor cuts through alert noise with automated triage.