CyberCX Hack Report: Insights from a year of offensive security testing

Holding a mirror to Medusa: A new and voracious threat actor

Threat Advisory

abstract

Published by CyberCX Cyber Intelligence on 7 March 2023

 

CyberCX Intelligence actively monitors the cyber threat landscape for emerging and novel threats to Australian and New Zealand organisations. This Intelligence Update provides situational awareness of cyber attacks attributed to a new and prolific cyber extortion group, calling itself Medusa Team.[1]

 

Key Points

 

Medusa Team

We assess Medusa Team poses a high threat to organisations in Australia, New Zealand. In February alone, Medusa Team was the second most frequent cyber extortion group to target organisations in the Pacific region.

Figure 1 – Medusa Team DLS posts by date and victim geography

 

Social networking

Medusa Team has a dedicated public relations strategy across dark and clear web platforms, likely intended to amplify damage to victims. This may increase the effectiveness of its double extortion threats.

We assess with high confidence that “OSINT without borders” is operating as the public relations function of Medusa Team and reports on breaches and republishes stolen data.

Figure 2 – OSINT without borders Telegram channel logo

 

Figure 3 – Extracts from a post to Breach Forums from user t0mas discussing Medusa team activity

 

Figure 4 – Breach Forums profile for t0mas

 

 

Technical Analysis

 

Similar Name, Different Threat Actors

Medusa Locker

We assess that Medusa Team and Medusa Locker are likely not the same cyber extortion operation.[5]

 

Medusa DDoS Botnet and Medusa Stealer

We assess that Medusa Team and Medusa Stealer (also known as the Medusa DDoS botnet) are highly likely not the same cyber extortion operation.[7]

Figure 5 – A Medusa Stealer ransom note obtained by CyberCX

[1] From time to time CyberCX Intelligence makes threat actor profiles public, if we judge that doing so will benefit our Australian and New Zealand communities. We do this after weighing the risks that publishing threat actor information may influence their tradecraft or operations and the benefits of providing actionable intelligence to cyber defenders.

[2] We make this assessment with medium confidence.

[3] The Telegram channel is https://t[.]me/+yXOcSjVjI9tjM2E0

[4] https://twitter3e4tixl4xyajtrzo62zg5vztmjuricljdp2c5kshju4avyoid.onion/search?q=medusa%20ransomeware&src=typeahead_click

[5] We make this assessment with medium confidence.

[6] The DLS address is http://z6wkgghtoawog5noty5nxulmmt2zs7c3yvwr22v4czbffdoly2kl4uad[.]onion

[7] We make this assessment with medium confidence.

[8] https://blog.cyble.com/2023/02/03/new-medusa-botnet-emerging-via-mirai-botnet-targeting-linux-users/

[9] https://blog.cyble.com/2023/02/03/new-medusa-botnet-emerging-via-mirai-botnet-targeting-linux-users/


 

Other Cyber Security Resources

Ready to get started?

Find out how CyberCX can help your organisation manage risk, respond to incidents and build cyber resilience.