BleepingComputer reports that the Medusa ransomware operation has been ramping up activity this year after a slow start in June 2021, with its claimed attack against Minneapolis Public Schools helping it gain media attention.
Despite similarities in name, the Medusa and MedusaLocker ransomware groups are different entities that both use a Tor website for ransom negotiations but have distinct ransom notes, encryption methods, and file extensions for encrypted files.
Medusa's Windows encryptor was discovered to accept command-line options enabling the file encryption process. More than 280 Windows services and processes are being terminated by the Medusa ransomware in a run without command line arguments, with the ransomware also having the ability to erase Windows Shadow Volume Copies to hinder file recovery.
Medusa ransomware also executes a specific command to erase backup program-related locally stored files, as well as virtual machines' virtual disk hard drives in an effort to curb file restoration.
The Philippine Health Insurance Corporation, which manages the country's universal healthcare system, had its websites and portals disrupted by a Medusa ransomware attack last week, from which it is struggling to recover, reports The Record, a news site by cybersecurity firm Recorded Future.
Japanese multinational conglomerate Sony has begun an investigation into an alleged cyberattack, which was reported to have resulted in the exposure of 3.14 GB of data in hacking forums, amid the emergence of different attackers claiming to be behind the hack, according to BleepingComputer.
Threat actors have leveraged the ZeroFont phishing attack technique, which initially involved the insertion of hidden characters or words in emails to evade security detection systems, to modify message previews as shown on Microsoft Outlook and other email clients, BleepingComputer reports.