On February 24, 2026, security firms including Symantec and Carbon Black reported that the North Korean state-sponsored threat actor, Lazarus Group, has integrated the Medusa ransomware into its cybercrime operations. This marks a significant tactical evolution, as the group is now leveraging a third-party Ransomware-as-a-Service (RaaS) platform operated by a group called Spearwing. Lazarus was observed using Medusa in an attack against a U.S. healthcare organization and another entity in the Middle East. This move suggests a strategic decision to outsource the extortion phase of their attacks, allowing them to focus on gaining initial access and leveraging pre-built criminal infrastructure for monetization, thereby increasing the scale and efficiency of their financially motivated campaigns.
Lazarus Group, a prolific APT actor linked to North Korea's Reconnaissance General Bureau, is known for a wide range of activities from cyber espionage to large-scale financial theft. While they have previously deployed their own custom ransomware strains like Maui and H0lyGh0st, this is a clear shift towards using established criminal RaaS platforms.
Medusa ransomware has been active since 2023 and operates a public data leak site to pressure victims into paying. The group has shown no compunction about targeting sensitive sectors, including healthcare facilities and non-profits. The adoption of Medusa by Lazarus Group combines the access capabilities of a top-tier state actor with the streamlined extortion model of a criminal enterprise.
The recent intrusions attributed to Lazarus Group featured a mix of their custom malware and commodity tools. The attack chain shows a sophisticated approach to gaining and maintaining access before deploying the ransomware.
Backdoors and RATs:
T1219 - Remote Access Software.Credential Access:
T1003 - OS Credential Dumping to harvest credentials from memory, enabling lateral movement.Impact:
T1486 - Data Encrypted for Impact. The attackers also engage in double extortion, exfiltrating data before encryption and threatening to leak it on their public site.The use of tools like Comebacker, previously associated with the Diamond Sleet (Pompilus) subgroup, and ransomware tactics linked to the Andariel (Stonefly) subgroup, suggests a high degree of tool and resource sharing within the broader Lazarus umbrella.
The adoption of the Medusa RaaS platform by Lazarus Group significantly lowers the barrier to entry for conducting widespread, impactful ransomware attacks. By outsourcing the ransomware deployment and negotiation process, Lazarus can focus its advanced skills on the initial compromise phase, making their operations more scalable and efficient. The specific targeting of the healthcare sector is particularly concerning, as this industry is often under-resourced and highly sensitive to operational disruptions. A successful attack can lead to canceled appointments, delayed medical procedures, and, in the worst cases, risks to patient safety. The average ransom demand of $260,000, while not the highest, is substantial enough to cripple smaller healthcare providers and non-profits.
Defenders should focus on detecting the precursor malware and TTPs used by Lazarus Group before the ransomware is deployed.
lsass.exe memory, a classic indicator of Mimikatz usage. Windows Defender Attack Surface Reduction (ASR) rules can help block this activity. This relates to D3FEND's D3-PA - Process Analysis.Preventing Lazarus intrusions and mitigating the impact of a potential ransomware attack requires a defense-in-depth strategy.
D3-FCR - File Content Rules.Deploy and maintain endpoint security solutions to detect and block known malware like Comebacker, BLINDINGCAN, and Medusa.
Restrict administrative privileges to limit the impact of credential theft tools like Mimikatz.
Implement a robust backup strategy with offline/immutable copies to ensure recovery from a ransomware attack without paying the ransom.
Train users to recognize and report phishing attempts, a common initial access vector for Lazarus.
To specifically counter the credential dumping phase of a Lazarus attack, organizations should use EDR or host-based intrusion detection systems to perform deep process analysis. Configure rules to monitor and alert on any process attempting to access the memory space of lsass.exe. This is a hallmark of Mimikatz activity. Legitimate processes rarely need to do this, making it a high-fidelity indicator of compromise. Attack Surface Reduction (ASR) rules in Microsoft Defender can be configured to block this specific behavior, providing a preventative control. This directly disrupts the attacker's ability to harvest credentials needed for lateral movement and privilege escalation.
The ultimate defense against the impact of the Medusa ransomware is a resilient backup and recovery strategy. This involves more than just performing backups; it requires implementing the 3-2-1 rule (three copies of data, on two different media, with one off-site). For ransomware, the 'off-site' copy must be offline or immutable, meaning it cannot be altered or deleted by the ransomware. Regularly test the restoration process to ensure data integrity and to validate that recovery time objectives (RTOs) can be met. This ensures that even if Lazarus successfully deploys Medusa, the organization can restore operations without engaging with the attackers or paying a ransom, neutralizing the threat's impact.
To prevent the execution of Lazarus's initial payloads and subsequent ransomware, organizations can implement executable denylisting. This involves using application control solutions to block the execution of known malicious files based on their hash or signature. Security teams should subscribe to threat intelligence feeds that provide hashes for malware like Comebacker, BLINDINGCAN, and Medusa. While determined attackers can modify their malware to generate new hashes, this control provides a valuable first layer of defense that can stop less sophisticated or automated stages of the attack, forcing the adversary to expend more effort and increasing the chances of detection.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats