FBI and CISA Advocate for Enabling Two-Factor Authentication to Combat Medusa Ransomware

The FBI and CISA have issued a warning regarding escalating Medusa ransomware attacks targeting critical infrastructure. This report details Medusa’s operational tactics, recommended safeguards, and the rationale against ransom payments.

A joint advisory from the Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA) has underscored a formidable threat emerging from the Medusa ransomware gang, an aggressive criminal organization employing ransomware-as-a-service (RaaS) methods since its detection in June 2021.

The advisory, titled #StopRansomware: Medusa Ransomware, indicates that this group poses a significant risk to pivotal sectors within the United States, particularly focusing on critical infrastructure. Reports indicate that organizations across various fields, including healthcare, education, legal services, insurance, technology, and manufacturing, have become targets. Notable victims include entities such as Bell Ambulance in Wisconsin and CPI Books, marking an alarming trend that has seen over 300 organizations affected by these attacks as of December 2024.

The Medusa ransomware threat is characterized by its varied infiltration methods, which include phishing and the exploitation of unpatched software vulnerabilities, such as the recent exploitation of a ScreenConnect authentication flaw (CVE-2024-1709). Once they penetrate a network, attackers leverage legitimate system administration tools to navigate undetected within compromised environments.

Medusa’s extortion strategy is particularly insidious, involving the encryption of victim data to render it inaccessible. Coupled with this, they threaten to release sensitive information if their monetary demands are not met, placing substantial pressure on organizations to comply in order to avoid public fallout.

The advisory reveals that Medusa developers frequently collaborate with initial access brokers (IABs) found in cybercriminal forums to facilitate their attacks. Compensation for these affiliates can range significantly, from $100 to $1 million, enticing them to partner exclusively with the Medusa group.

This gang employs sophisticated techniques to mask their activities, using remote access software for system control and encrypted scripts to establish covert communications with command servers, effectively evading detection from standard security measures.

Compounding the threat is the urgent nature of their extortion pressure, where victims are often given just two days to remit payment. They use direct communications to escalate the urgency, and failure to comply leads to the release of stolen data on the dark web. Disturbingly, there have been instances where paying the ransom did not halt further demands.

In light of this rising threat, federal authorities stress the importance of regularly updating software, enacting robust access controls, and applying multi-factor authentication. Organizations are advised to monitor network activity for irregularities, limit the use of remote desktop protocols, and segment networks to mitigate potential breaches.

Additionally, the recommendation to enable two-factor authentication for webmail and VPNs underscores the role of social engineering in facilitating these attacks. All organizations impacted by Medusa are encouraged to report incidents to law enforcement and refrain from paying ransom demands.

Source