TL;DR

Lazarus Group is now using Medusa ransomware to target healthcare organizations globally, marking a shift in their operational tactics.

What happened

["North Korea's Lazarus Group launched ransomware attacks with Medusa targeting at least one US healthcare organization.", 'Medusa ransomware has also affected an unnamed victim in the Middle East.']

Why it matters for ops

['Healthcare organizations are critical targets due to sensitive data and high-pressure situations.', 'The use of new ransomware indicates a proactive approach by Lazarus Group to avoid detection and maintain operational security.']

Mitigation

  • Implement strict access controls and segmentation in healthcare networks.
  • Regularly update security patches for all critical systems.
  • Conduct thorough incident response training focused on ransomware scenarios.

Action items

  • Review and enhance backup protocols to ensure quick recovery from ransomware attacks.
  • Deploy advanced threat detection solutions capable of identifying unknown malware like Medusa.
  • Strengthen cybersecurity awareness programs within healthcare organizations

Detection IOCs

  • Ransom notes with specific encryption patterns
  • Lateral movement across network segments
  • Unusual data exfiltration activities

Source link

https://go.theregister.com/feed/www.theregister.com/2026/02/24/north_koreas_lazarus_group_healthcare_medusa_ransomware/