Topic: medusa ransomware

  • Microsoft GoAnywhere Flaw Fuels Ransomware Attacks

    Microsoft GoAnywhere Flaw Fuels Ransomware Attacks

    A critical vulnerability (CVE-2025-10035) in Fortra's GoAnywhere MFT platform is being exploited by ransomware attackers, allowing remote access without user interaction. The cybercrime group Storm-1175, linked to Medusa ransomware, is actively using this flaw to gain initial access, deploy remot...

    Read More »
  • North Korean Lazarus Group Unleashes Medusa Ransomware

    North Korean Lazarus Group Unleashes Medusa Ransomware

    North Korean state-sponsored hackers, specifically the Lazarus Group, are conducting a new wave of Medusa ransomware attacks targeting the U.S. healthcare sector to demand significant ransoms. The attacks employ a sophisticated toolkit of malware for network intrusion and data theft, with the exa...

    Read More »
  • Ransomware gang asked BBC reporter to hack media giant

    Ransomware gang asked BBC reporter to hack media giant

    A BBC cybersecurity journalist was targeted by the Medusa ransomware gang, which attempted to recruit him as an insider threat to gain network access in exchange for a share of a ransom payment. The Medusa gang is known for double-extortion tactics and has been linked to over 300 attacks on U.S. ...

    Read More »
  • 1.2 Million SimonMed Patients Hit by Data Breach

    1.2 Million SimonMed Patients Hit by Data Breach

    Over 1.2 million patients of SimonMed Imaging were affected by a data breach, where hackers gained unauthorized network access, potentially exposing sensitive personal and medical information. The Medusa ransomware group claimed responsibility, demanding a $1 million ransom after exfiltrating 212...

    Read More »
  • Microsoft GoAnywhere Bug Fuels Medusa Ransomware Attacks

    Microsoft GoAnywhere Bug Fuels Medusa Ransomware Attacks

    A critical vulnerability (CVE-2025-10035) in Fortra's GoAnywhere platform allows unauthenticated attackers to execute remote code, prompting urgent patching and removal of internet exposure. The flaw was exploited as a zero-day by Storm-1175, who used legitimate tools for reconnaissance and deplo...

    Read More »