By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Lazarus Group Uses Medusa Ransomware in Middle East and U.S. Healthcare Attacks
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > Lazarus Group Uses Medusa Ransomware in Middle East and U.S. Healthcare Attacks
Computing

Lazarus Group Uses Medusa Ransomware in Middle East and U.S. Healthcare Attacks

News Room
Last updated: 2026/02/24 at 7:43 AM
News Room Published 24 February 2026
Share
Lazarus Group Uses Medusa Ransomware in Middle East and U.S. Healthcare Attacks
SHARE

Ravie LakshmananFeb 24, 2026Threat Intelligence / Healthcare

The North Korea-linked Lazarus Group (aka Diamond Sleet and Pompilus) has been observed using Medusa ransomware in an attack targeting an unnamed entity in the Middle East, according to a new report by the Symantec and Carbon Black Threat Hunter Team.

Broadcom’s threat intelligence division said it also identified the same threat actors mounting an unsuccessful attack against a healthcare organization in the U.S. Medusa is a ransomware-as-a-service (RaaS) operation launched by a cybercrime group known as Spearwing in 2023. The group has claimed more than 366 attacks to date.

“Analysis of the Medusa leak site reveals attacks against four healthcare and non-profit organizations in the U.S. since the beginning of November 2025,” the company said in a report shared with The Hacker News.

“Victims included a non-profit in the mental health sector and an educational facility for autistic children. It is unknown if all these victims were targeted by North Korean operatives or if other Medusa affiliates were responsible for some of these attacks. The average ransom demand in that period was $260,000.”

The use of ransomware by North Korean hacking groups is not without precedent. As far back as 2021, a Lazarus sub-cluster referred to as Andariel (aka Stonefly) was observed striking entities in South Korea, Japan, and the U.S. with bespoke ransomware families like SHATTEREDGLASS and Maui.

Then, in October 2024, the hacking crew was also linked to a Play ransomware attack, marking the transition to an off-the-shelf locker to encrypt victim systems and demand a ransom.

That said, Andariel is not alone in shifting from custom ransomware to an already available variant. Last year, Bitdefender revealed that another North Korean threat actor tracked as Moonstone Sleet, which previously dropped a custom ransomware family called FakePenny, had likely targeted several South Korean financial firms with Qilin ransomware.

These changes possibly signal a tactical shift among North Korean hacking groups where they are operating as affiliates for established RaaS groups rather than developing their tools, the company told The Hacker News.

“The motivation is most likely pragmatism,” Dick O’Brien, principal intelligence analyst for the Symantec and Carbon Black Threat Hunter Team, said. “Why go to the trouble of developing your own ransomware payload when you can use a tried-and-tested threat such as Medusa or Qilin? They may have decided that the benefits outweigh the costs in terms of affiliate fees.”

The Lazarus Group’s Medusa ransomware campaign includes the use of various tools –

  • RP_Proxy, a custom proxy utility
  • Mimikatz, a publicly available credential dumping program
  • Comebacker, a custom backdoor exclusively used by the threat actor
  • InfoHook, an information stealer previously identified as used in conjunction with Comebacker
  • BLINDINGCAN (aka AIRDRY or ZetaNile), a remote access trojan
  • ChromeStealer, a tool for extracting stored passwords from the Chrome browser

The activity has not been tied to any specific Lazarus sub-group, despite the fact that the extortion attacks mirror previous Andariel attacks.

“The switch to Medusa demonstrates that North Korea’s rapacious involvement in cybercrime continues unabated,” the company said. “North Korean actors appear to have few scruples about targeting organizations in the U.S. While some cybercrime outfits claim to steer clear of targeting healthcare organizations due to the reputational damage it may attract, Lazaurs doesn’t seem to be in any way constrained.”

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article The next iPhone could borrow a serious trick from professional cameras. Here’s why it could be game-changing | Stuff The next iPhone could borrow a serious trick from professional cameras. Here’s why it could be game-changing | Stuff
Next Article In reality, no one liked Xbox’s strategy? In reality, no one liked Xbox’s strategy?
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

This popular PS1 emulator is ending Android support, and fans only have themselves to blame
This popular PS1 emulator is ending Android support, and fans only have themselves to blame
News
BTS Is Back: Here's Everything to Know About Their Return and Live Show on Netflix
BTS Is Back: Here's Everything to Know About Their Return and Live Show on Netflix
News
Siri and refined Liquid Glass controls on the docket for WWDC 2026
Siri and refined Liquid Glass controls on the docket for WWDC 2026
News
Google’s Gemini, OpenAI’s ChatGPT, or Microsoft Copilot Are Coming to the Senate
Google’s Gemini, OpenAI’s ChatGPT, or Microsoft Copilot Are Coming to the Senate
News

You Might also Like

Firecrawl First, Bing Second: A Safer Way to Enrich Company Data | HackerNoon
Computing

Firecrawl First, Bing Second: A Safer Way to Enrich Company Data | HackerNoon

14 Min Read
Hope Is Not a Strategy in Fintech | HackerNoon
Computing

Hope Is Not a Strategy in Fintech | HackerNoon

0 Min Read
Hangs & Performance Regression On Large Systems Fixed For Linux 7.0-rc4
Computing

Hangs & Performance Regression On Large Systems Fixed For Linux 7.0-rc4

3 Min Read
Rebuilding CRM Truth From Noisy Events | HackerNoon
Computing

Rebuilding CRM Truth From Noisy Events | HackerNoon

14 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?