Medusa

Also known as: Medusa Ransomware Gang, Medusa Blog
Affiliation Cybercriminal
Motivation Financial
Status active
Country Unknown
First Seen 2021
Last Seen 2025
Target Geographies Global, United States, Europe

Executive Summary

Medusa is a ransomware and extortion operation active since 2021 that has repeatedly targeted education, healthcare, government, and other critical sectors. The group runs a double-extortion model, encrypting victim environments while threatening to publish stolen information on its “Medusa Blog” leak site. Public reporting ties the name to a growing number of high-impact incidents, but the specific people or sub-groups operating under the Medusa label have not been publicly identified.

In March 2025, CISA, FBI, and MS-ISAC published a joint advisory on Medusa ransomware, providing detailed indicators of compromise and defensive guidance. The group has demonstrated a willingness to target educational institutions and healthcare providers and to use public leak-site pressure when negotiations fail. Medusa should not be casually flattened into other similarly named families such as MedusaLocker, which is tracked separately in many vendor taxonomies.

Notable Campaigns

2023 — Minneapolis Public Schools

Medusa ransomware operators attacked Minneapolis Public Schools, encrypting systems and exfiltrating student and staff data. After the district refused to pay the $1 million ransom, the group published stolen data including sensitive student records.

2024-2025 — Healthcare and Government Targeting

Medusa increased targeting of healthcare organizations and government agencies, prompting the March 2025 joint advisory from CISA and FBI.

Technical Capabilities

Medusa ransomware is typically deployed after initial access gained through phishing, exploitation of unpatched vulnerabilities, or purchased credentials from access brokers. The ransomware uses AES-256 encryption and appends the .medusa extension. Before encryption, operators exfiltrate data for double extortion.

The group uses standard post-exploitation tools including Cobalt Strike, Mimikatz, PsExec, and Advanced IP Scanner for lateral movement and credential harvesting. Medusa operators disable security tools and delete volume shadow copies before deploying ransomware.

Attribution

Medusa is tracked as a RaaS operation by FBI and CISA. No specific individuals have been publicly identified or indicted. The group operates a Tor-based leak site and uses encrypted communication channels for ransom negotiations.

MITRE ATT&CK Profile

Initial Access: Phishing (T1566), valid accounts (T1078), and exploitation of public-facing applications (T1190).

Credential Access: Mimikatz (T1003), credential harvesting from browsers and cached credentials.

Impact: File encryption (T1486), shadow copy deletion (T1490), and double extortion through data leak site.

Sources & References