Lazarus Group Uses Medusa Ransomware Targets Healthcare Sector

Cybersecurity researchers uncovered North Korea-linked Lazarus Group using Medusa ransomware. They attacked an entity in the Middle East and tried a U.S. healthcare organization. This shows a shift to off-the-shelf ransomware for financial gain.

Ransomware Deployment Details

Lazarus deployed Medusa in a Middle East attack successfully. They also launched an unsuccessful attempt against a U.S. healthcare target. Medusa is a ransomware-as-a-service operation started in 2023. It has claimed over 366 victims so far.

The Medusa leak site listed four U.S. healthcare and non-profit victims since November 2025. These included a mental health non-profit and a school for autistic children. Average ransom demands reached $260,000 during this period. It remains unclear if Lazarus hit all these victims or if other affiliates acted.

North Korean Ransomware History

North Korean groups have used ransomware before. Andariel sub-cluster struck South Korea, Japan, and the U.S. with custom families like SHATTEREDGLASS and Maui in 2021. Later, they switched to Play ransomware in 2024.

Another group, Moonstone Sleet, moved from custom FakePenny to Qilin ransomware. This pattern suggests pragmatism. Attackers now prefer proven RaaS options over building their own tools. They pay affiliate fees but save development time.

Lazarus combined several tools with Medusa. They used a custom proxy called RP_Proxy. They ran Mimikatz for credential dumping. Comebacker, a unique backdoor, appeared in the chain.

InfoHook stole additional information. BLINDINGCAN provided remote access. ChromeStealer grabbed browser passwords. This toolkit supported initial access, persistence, and data theft before encryption.

Motivations and Implications

The shift to Medusa reflects practical choices. Lazarus avoids custom development costs. They gain reliable encryption and leak-site pressure. This allows focus on access and extortion.

North Korean actors show no hesitation targeting healthcare. Unlike some criminals, they ignore reputational risks. Therefore, U.S. medical organizations face heightened danger. Financial motives drive these attacks strongly.

Broader Threat Context

Lazarus operates across regions aggressively. They blend state espionage with cybercrime. The group uses shared tools with other actors. This makes attribution complex at times.

The campaign highlights evolving tactics. North Korean hackers adapt quickly. They exploit RaaS for profit. Consequently, global organizations must stay vigilant against such threats.

Prevention Strategies

Organizations can block these attacks with strong layered defenses. First, enforce strict patch management and disable unnecessary macros in Office files. Train staff to spot phishing and verify suspicious attachments carefully. Moreover, use continuous monitoring to detect unusual outbound connections, credential dumping tools like Mimikatz, or ransomware indicators early.

Implement endpoint detection for anomalous process behavior and file encryption spikes. Restrict admin privileges and maintain offline backups. These steps greatly reduce the risk of successful ransomware deployment by groups like Lazarus.

Sleep well, we got you covered.

Scroll to Top