North Korea's Lazarus Group Adopts Medusa Ransomware, Targeting Healthcare

Lazarus Group Observed Using Medusa Ransomware-as-a-Service in Attacks on U.S. Healthcare and Middle East

HIGH
February 25, 2026
5m read
Threat ActorRansomwareCyberattack

Related Entities

Threat Actors

Lazarus Group AndarielDiamond SleetSpearwing

Organizations

SymantecCarbon Black

Products & Tech

Other

MedusaComebackerBLINDINGCAN InfoHook

Full Report

Executive Summary

On February 24, 2026, security firms including Symantec and Carbon Black reported that the North Korean state-sponsored threat actor, Lazarus Group, has integrated the Medusa ransomware into its cybercrime operations. This marks a significant tactical evolution, as the group is now leveraging a third-party Ransomware-as-a-Service (RaaS) platform operated by a group called Spearwing. Lazarus was observed using Medusa in an attack against a U.S. healthcare organization and another entity in the Middle East. This move suggests a strategic decision to outsource the extortion phase of their attacks, allowing them to focus on gaining initial access and leveraging pre-built criminal infrastructure for monetization, thereby increasing the scale and efficiency of their financially motivated campaigns.

Threat Overview

Lazarus Group, a prolific APT actor linked to North Korea's Reconnaissance General Bureau, is known for a wide range of activities from cyber espionage to large-scale financial theft. While they have previously deployed their own custom ransomware strains like Maui and H0lyGh0st, this is a clear shift towards using established criminal RaaS platforms.

Medusa ransomware has been active since 2023 and operates a public data leak site to pressure victims into paying. The group has shown no compunction about targeting sensitive sectors, including healthcare facilities and non-profits. The adoption of Medusa by Lazarus Group combines the access capabilities of a top-tier state actor with the streamlined extortion model of a criminal enterprise.

Technical Analysis

The recent intrusions attributed to Lazarus Group featured a mix of their custom malware and commodity tools. The attack chain shows a sophisticated approach to gaining and maintaining access before deploying the ransomware.

Backdoors and RATs:

  • Comebacker: A versatile backdoor used to gain an initial foothold and fetch additional payloads.
  • BLINDINGCAN: A full-featured Remote Access Trojan (RAT) used for long-term access, reconnaissance, and control over the compromised system. This tool facilitates T1219 - Remote Access Software.
  • InfoHook: An infostealer used to gather sensitive information from the victim's machine.

Credential Access:

Impact:

  • Medusa Ransomware: The final payload used for T1486 - Data Encrypted for Impact. The attackers also engage in double extortion, exfiltrating data before encryption and threatening to leak it on their public site.

The use of tools like Comebacker, previously associated with the Diamond Sleet (Pompilus) subgroup, and ransomware tactics linked to the Andariel (Stonefly) subgroup, suggests a high degree of tool and resource sharing within the broader Lazarus umbrella.

Impact Assessment

The adoption of the Medusa RaaS platform by Lazarus Group significantly lowers the barrier to entry for conducting widespread, impactful ransomware attacks. By outsourcing the ransomware deployment and negotiation process, Lazarus can focus its advanced skills on the initial compromise phase, making their operations more scalable and efficient. The specific targeting of the healthcare sector is particularly concerning, as this industry is often under-resourced and highly sensitive to operational disruptions. A successful attack can lead to canceled appointments, delayed medical procedures, and, in the worst cases, risks to patient safety. The average ransom demand of $260,000, while not the highest, is substantial enough to cripple smaller healthcare providers and non-profits.

Detection & Response

Defenders should focus on detecting the precursor malware and TTPs used by Lazarus Group before the ransomware is deployed.

  1. Monitor for Lazarus Tooling: Deploy EDR and network security solutions with signatures and behavioral rules to detect Comebacker, BLINDINGCAN, and other known Lazarus malware families.
  2. Credential Dumping Detection: Monitor for processes accessing lsass.exe memory, a classic indicator of Mimikatz usage. Windows Defender Attack Surface Reduction (ASR) rules can help block this activity. This relates to D3FEND's D3-PA - Process Analysis.
  3. Threat Hunting: Proactively hunt for signs of Lazarus activity, such as the execution of suspicious commands, unexpected network connections from legitimate processes, and the presence of their known tools on endpoints.

Mitigation

Preventing Lazarus intrusions and mitigating the impact of a potential ransomware attack requires a defense-in-depth strategy.

  1. Endpoint Protection: Use a modern EDR and antivirus solution capable of detecting and blocking known Lazarus malware and ransomware behaviors. This is a core component of D3FEND's D3-FCR - File Content Rules.
  2. Phishing and Spearphishing Protection: As phishing is a common entry vector for Lazarus, robust email security gateways and continuous user security training are essential.
  3. Privileged Account Management: Enforce the principle of least privilege and tightly control access to administrative accounts to limit an attacker's ability to move laterally and deploy ransomware network-wide.
  4. Backup and Recovery: Maintain isolated, immutable backups of critical data and systems. Regularly test recovery procedures to ensure business operations can be restored quickly without paying a ransom.

Timeline of Events

1
February 24, 2026
Security researchers report that Lazarus Group has adopted Medusa ransomware.
2
February 25, 2026
This article was published

MITRE ATT&CK Mitigations

Deploy and maintain endpoint security solutions to detect and block known malware like Comebacker, BLINDINGCAN, and Medusa.

Restrict administrative privileges to limit the impact of credential theft tools like Mimikatz.

Implement a robust backup strategy with offline/immutable copies to ensure recovery from a ransomware attack without paying the ransom.

Train users to recognize and report phishing attempts, a common initial access vector for Lazarus.

D3FEND Defensive Countermeasures

To specifically counter the credential dumping phase of a Lazarus attack, organizations should use EDR or host-based intrusion detection systems to perform deep process analysis. Configure rules to monitor and alert on any process attempting to access the memory space of lsass.exe. This is a hallmark of Mimikatz activity. Legitimate processes rarely need to do this, making it a high-fidelity indicator of compromise. Attack Surface Reduction (ASR) rules in Microsoft Defender can be configured to block this specific behavior, providing a preventative control. This directly disrupts the attacker's ability to harvest credentials needed for lateral movement and privilege escalation.

The ultimate defense against the impact of the Medusa ransomware is a resilient backup and recovery strategy. This involves more than just performing backups; it requires implementing the 3-2-1 rule (three copies of data, on two different media, with one off-site). For ransomware, the 'off-site' copy must be offline or immutable, meaning it cannot be altered or deleted by the ransomware. Regularly test the restoration process to ensure data integrity and to validate that recovery time objectives (RTOs) can be met. This ensures that even if Lazarus successfully deploys Medusa, the organization can restore operations without engaging with the attackers or paying a ransom, neutralizing the threat's impact.

To prevent the execution of Lazarus's initial payloads and subsequent ransomware, organizations can implement executable denylisting. This involves using application control solutions to block the execution of known malicious files based on their hash or signature. Security teams should subscribe to threat intelligence feeds that provide hashes for malware like Comebacker, BLINDINGCAN, and Medusa. While determined attackers can modify their malware to generate new hashes, this control provides a valuable first layer of defense that can stop less sophisticated or automated stages of the attack, forcing the adversary to expend more effort and increasing the chances of detection.

Sources & References

Lazarus Group Uses Medusa Ransomware in Middle East and U.S. Healthcare Attacks
The Hacker News (thehackernews.com) February 24, 2026
North Korea's Lazarus Group targets healthcare orgs with Medusa ransomware
The Register (theregister.com) February 24, 2026

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

Lazarus GroupMedusaRansomwareRaaSHealthcareNorth KoreaAPTBLINDINGCAN

📢 Share This Article

Help others stay informed about cybersecurity threats