North Korean state hackers seen using Medusa ransomware in attacks on US, Middle East

Hackers tied to one of North Korea’s most sophisticated state-backed groups have been seen deploying Medusa ransomware in financially-motivated attacks on at least two institutions. 

Cybersecurity experts at Symantec said they saw Medusa attacks launched by members of Lazarus — a well-known North Korean hacking operation housed within the country’s military — against a company in the Middle East and a healthcare organization in the U.S. 

Medusa is operated on the ransomware-as-a-service model, where affiliates can launch attacks using the malware and offer the ransomware’s developers a percentage of the ransom payment. The group emerged in 2023 and has since launched more than 350 attacks, with experts tying them to a larger cybercrime group known as Spearwing. 

Dick O’Brien, principal intelligence analyst atSymantec, noted that North Korean actors were previously seen using ransomware strains like Maui and Play, but this is the first time they had been tracked using Medusa. 

“Maui was reportedly developed by Lazarus themselves, but more recently they seem to have shifted to using ransomware-as-a-service offerings instead,” he said.

U.S. law enforcement agencies raised alarms about North Korea’s use of the Maui ransomware in 2022, warning that the hackers were using it to target U.S. hospitals and healthcare companies.

In 2024, a federal arrest warrant was issued for Rim Jong Hyok, an alleged member of the Andariel Unit within the country’s intelligence agency, the Reconnaissance General Bureau (RGB).

Rim was identified by several U.S. military agencies as the culprit behind several ransomware attacks using the Maui strain that were conducted in 2021 and 2022. At least one of the attacks targeted a hospital in Kansas, where the warrant for Rim’s arrest was issued. The attacks encrypted computers and servers used for medical testing or electronic medical records and disrupted healthcare services at facilities in Kansas, Colorado and other states

The FBI said investigators found that Rim and other Andariel actors victimized five healthcare providers, four U.S.-based defense contractors, two U.S. Air Force bases, and the National Aeronautics and Space Administration’s Office of Inspector General. 

U.S. agencies said Rim used the ransoms from the attacks to buy servers that were then used in other cyber espionage hacks against government organizations and customers in the U.S., South Korea and China.

The State Department also offered a reward of $10 million for information about Rim, who the U.S. government said was last known to be in North Korea. 

O’Brien said they could not confirm it but believed the recent ransomware attacks using Medusa were also launched by Andariel, which law enforcement agencies have said is a subgroup within Lazarus. 

Symantec said after the indictment they saw North Korean members of Andariel launch three other financially-motivated attacks in October 2024 on organizations in the U.S., although no ransomware was successfully deployed. That same month, another cybersecurity firm said it saw North Korean actors using the Play ransomware in attacks

Symantec was able to attribute the most recent Medusa attacks to North Korea due to the use of custom tools used exclusively by Lazarus, including a backdoor tool, malware and a Chrome browser password extractor. 

The report comes after multiple cybersecurity companies warned over the past two years that there is increasing coordination between nation-states and cybercriminals.

Nation-state groups from Russia, China, North Korea and Iran that were typically involved in espionage or disinformation operations are now deploying ransomware as a way to gain financially from their offensive cyber operations or to provide cover for other cyber objectives. 

Multiple ransomware gangs openly backed Russia at the onset of the Ukraine invasion and Google found former members of the notorious Conti ransomware group repurposed many of their tools for attacks on Ukrainian organizations.

In several cases, ransomware has been used as a cover for Chinese espionage activity. Law enforcement agencies have also seen instances of Iranian government hackers using their official access to later launch financially-motivated attacks as part of an effort to double-dip and moonlight as cybercriminals, monetizing their hacking skills

The FBI previously said it witnessed Iranian actors partnering with affiliates of the NoEscape, Ransomhouse and AlphV ransomware operations — eventually taking a percentage of ransom payments. 

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Jonathan Greig

Jonathan Greig

is a Breaking News Reporter at Recorded Future News. Jonathan has worked across the globe as a journalist since 2014. Before moving back to New York City, he worked for news outlets in South Africa, Jordan and Cambodia. He previously covered cybersecurity at ZDNet and TechRepublic.

 

Total
0
Shares
Previous Post

Identity Prioritization isn’t a Backlog Problem – It’s a Risk Math Problem

Related Posts

CISA Adds Two Actively Exploited Roundcube Flaws to KEV Catalog

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added two security flaws impacting Roundcube webmail software to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation. The vulnerabilities in question are listed below - CVE-2025-49113 (CVSS score: 9.9) - A deserialization of untrusted data vulnerability that allows remote code
Read More

[Webinar] The Smarter SOC Blueprint: Learn What to Build, Buy, and Automate

Most security teams today are buried under tools. Too many dashboards. Too much noise. Not enough real progress. Every vendor promises “complete coverage” or “AI-powered automation,” but inside most SOCs, teams are still overwhelmed, stretched thin, and unsure which tools are truly pulling their weight. The result? Bloated stacks, missed signals, and mounting pressure to do more with less. This
Read More

Chrome Extension Caught Injecting Hidden Solana Transfer Fees Into Raydium Swaps

Cybersecurity researchers have discovered a new malicious extension on the Chrome Web Store that's capable of injecting a stealthy Solana transfer into a swap transaction and transferring the funds to an attacker-controlled cryptocurrency wallet. The extension, named Crypto Copilot, was first published by a user named "sjclark76" on May 7, 2024. The developer describes the browser add-on as
Read More