North Korean state hackers seen using Medusa ransomware in attacks on US, Middle East

Hackers tied to one of North Korea’s most sophisticated state-backed groups have been seen deploying Medusa ransomware in financially-motivated attacks on at least two institutions. 

Cybersecurity experts at Symantec said they saw Medusa attacks launched by members of Lazarus — a well-known North Korean hacking operation housed within the country’s military — against a company in the Middle East and a healthcare organization in the U.S. 

Medusa is operated on the ransomware-as-a-service model, where affiliates can launch attacks using the malware and offer the ransomware’s developers a percentage of the ransom payment. The group emerged in 2023 and has since launched more than 350 attacks, with experts tying them to a larger cybercrime group known as Spearwing. 

Dick O’Brien, principal intelligence analyst atSymantec, noted that North Korean actors were previously seen using ransomware strains like Maui and Play, but this is the first time they had been tracked using Medusa. 

“Maui was reportedly developed by Lazarus themselves, but more recently they seem to have shifted to using ransomware-as-a-service offerings instead,” he said.

U.S. law enforcement agencies raised alarms about North Korea’s use of the Maui ransomware in 2022, warning that the hackers were using it to target U.S. hospitals and healthcare companies.

In 2024, a federal arrest warrant was issued for Rim Jong Hyok, an alleged member of the Andariel Unit within the country’s intelligence agency, the Reconnaissance General Bureau (RGB).

Rim was identified by several U.S. military agencies as the culprit behind several ransomware attacks using the Maui strain that were conducted in 2021 and 2022. At least one of the attacks targeted a hospital in Kansas, where the warrant for Rim’s arrest was issued. The attacks encrypted computers and servers used for medical testing or electronic medical records and disrupted healthcare services at facilities in Kansas, Colorado and other states

The FBI said investigators found that Rim and other Andariel actors victimized five healthcare providers, four U.S.-based defense contractors, two U.S. Air Force bases, and the National Aeronautics and Space Administration’s Office of Inspector General. 

U.S. agencies said Rim used the ransoms from the attacks to buy servers that were then used in other cyber espionage hacks against government organizations and customers in the U.S., South Korea and China.

The State Department also offered a reward of $10 million for information about Rim, who the U.S. government said was last known to be in North Korea. 

O’Brien said they could not confirm it but believed the recent ransomware attacks using Medusa were also launched by Andariel, which law enforcement agencies have said is a subgroup within Lazarus. 

Symantec said after the indictment they saw North Korean members of Andariel launch three other financially-motivated attacks in October 2024 on organizations in the U.S., although no ransomware was successfully deployed. That same month, another cybersecurity firm said it saw North Korean actors using the Play ransomware in attacks

Symantec was able to attribute the most recent Medusa attacks to North Korea due to the use of custom tools used exclusively by Lazarus, including a backdoor tool, malware and a Chrome browser password extractor. 

The report comes after multiple cybersecurity companies warned over the past two years that there is increasing coordination between nation-states and cybercriminals.

Nation-state groups from Russia, China, North Korea and Iran that were typically involved in espionage or disinformation operations are now deploying ransomware as a way to gain financially from their offensive cyber operations or to provide cover for other cyber objectives. 

Multiple ransomware gangs openly backed Russia at the onset of the Ukraine invasion and Google found former members of the notorious Conti ransomware group repurposed many of their tools for attacks on Ukrainian organizations.

In several cases, ransomware has been used as a cover for Chinese espionage activity. Law enforcement agencies have also seen instances of Iranian government hackers using their official access to later launch financially-motivated attacks as part of an effort to double-dip and moonlight as cybercriminals, monetizing their hacking skills

The FBI previously said it witnessed Iranian actors partnering with affiliates of the NoEscape, Ransomhouse and AlphV ransomware operations — eventually taking a percentage of ransom payments. 

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Jonathan Greig

Jonathan Greig

is a Breaking News Reporter at Recorded Future News. Jonathan has worked across the globe as a journalist since 2014. Before moving back to New York City, he worked for news outlets in South Africa, Jordan and Cambodia. He previously covered cybersecurity at ZDNet and TechRepublic.

 

Total
0
Shares
Previous Post

Identity Prioritization isn’t a Backlog Problem – It’s a Risk Math Problem

Next Post

UAE claims it stopped ‘terrorist’ ransomware attack

Related Posts

Google Warns of Active Exploitation of WinRAR Vulnerability CVE-2025-8088

Google on Tuesday revealed that multiple threat actors, including nation-state adversaries and financially motivated groups, are exploiting a now-patched critical security flaw in RARLAB WinRAR to establish initial access and deploy a diverse array of payloads. "Discovered and patched in July 2025, government-backed threat actors linked to Russia and China as well as financially motivated
Read More

North Korea-Linked UNC1069 Uses AI Lures to Attack Cryptocurrency Organizations

The North Korea-linked threat actor known as UNC1069 has been observed targeting the cryptocurrency sector to steal sensitive data from Windows and macOS systems with the ultimate goal of facilitating financial theft. "The intrusion relied on a social engineering scheme involving a compromised Telegram account, a fake Zoom meeting, a ClickFix infection vector, and reported usage of AI-generated
Read More

China-Linked DKnife AitM Framework Targets Routers for Traffic Hijacking, Malware Delivery

Cybersecurity researchers have taken the wraps off a gateway-monitoring and adversary-in-the-middle (AitM) framework dubbed DKnife that's operated by China-nexus threat actors since at least 2019. The framework comprises seven Linux-based implants that are designed to perform deep packet inspection, manipulate traffic, and deliver malware via routers and edge devices. Its primary targets seem to
Read More