





























See Also
See Again
© Shutterstock
0 / 30 Fotos
Ransomware threat
- According to warnings from multiple government agencies, a ransomware program has taken hundreds of victims' data hostage in exchange for a ransom.
© Shutterstock
1 / 30 Fotos
Medusa ransomware overview
- Since February 2025, Medusa, a "ransomware-as-a-service variant used to conduct ransomware attacks," has claimed over 300 victims.
© Shutterstock
2 / 30 Fotos
Government agencies’ warnings
- The FBI and US Cybersecurity and Infrastructure Security Agency are warning the world about the dangers of ransomware schemes, like Medusa.
© Shutterstock
3 / 30 Fotos
Ransomware-as-a-service model
- Medusa has since progressed to using an affiliate model, but the developers still control important operations such as ransom negotiation. This structure allows multiple cybercriminal groups to launch Medusa attacks while sharing profits with the original developers.
© Shutterstock
4 / 30 Fotos
Medusa’s attack techniques
- Since 2021, the ransomware-as-a-service provider has used phishing and other common ransomware techniques.
© Shutterstock
5 / 30 Fotos
Phishing as a primary attack method
- The main method used is phishing, according to CISA. These campaigns often impersonate legitimate organizations and trick users into clicking links that are actually malicious.
© Shutterstock
6 / 30 Fotos
Exploiting software vulnerabilities
- Medusa actors exploit unpatched software vulnerabilities to break into networks across many different industries. Keeping software updated is crucial, as attackers frequently target outdated systems.
© Shutterstock
7 / 30 Fotos
The double extortion model explained
- Medusa developers and affiliates use a double extortion model, where they “encrypt victim data and threaten to publicly release exfiltrated data if a ransom is not paid.” This pressures victims into paying even if they have backups in order to prevent public exposure.
© Shutterstock
8 / 30 Fotos
Medusa’s data-leak website
- There is a data-leak website run by Medusa that shows its victims and a countdown to the release of private information.
© Shutterstock
9 / 30 Fotos
Ransom payment structure
- Ransoms are demanded and posted on the site including direct links to Medusa-affiliated cryptocurrency wallets. The victims can pay US$10,000 in cryptocurrency to add time to the countdown timer.
© Shutterstock
10 / 30 Fotos
Industries affected by Medusa
- Critical sectors have been targeted, including medical, educational, and legal organizations. This has led to significant financial losses.
© Shutterstock
11 / 30 Fotos
Medusa’s evolution since 2021
- Medusa originally started as a closed ransomware variant. However, over the years, it has become a broader criminal enterprise.
© Shutterstock
12 / 30 Fotos
Recommended cybersecurity measures
- Officials recommended patching operating systems, software, and firmware and using multifactor authentication to protect against ransomware.
© Shutterstock
13 / 30 Fotos
Importance of software patching
- If your software isn't updated it can be exposed to more vulnerabilities. It's important to make sure operating systems and software are properly patched and up to date.
© Shutterstock
14 / 30 Fotos
Role of multifactor authentication
- If you're using webmail services such as Gmail or Microsoft Outlook or even VPNs, you should start using multifactor authentication. MFAs significantly reduce the risk of unauthorized entry.
© Shutterstock
15 / 30 Fotos
Risks of frequent password changes
- Experts warn against frequently recurring passwords as this can weaken security. Instead, you should have a unique password that is only changed when a breach is suspected.
© Shutterstock
16 / 30 Fotos
Best practices for password security
- Use long, unique passwords combined with multifactor authentication as it can add an extra layer of protection against credential theft. A password manager can help users generate and store complex passwords securely.
© Shutterstock
17 / 30 Fotos
Backing up important data
- Organizations specifically should store copies of more sensitive or crucial information on separate, physical devices and place them in extremely secure locations.
© Shutterstock
18 / 30 Fotos
Network segmentation for security
- Other steps for an organization might include segmenting networks as well as requiring a VPN for remote access.
© Shutterstock
19 / 30 Fotos
Using VPNs for remote access
- VPNs can help reduce the risk of unauthorized access and can enhance security overall.
© Shutterstock
20 / 30 Fotos
How to recognize ransomware attacks
- Normally, you won't realize your computer has been infected until it's too late. You may go to login and no longer have access to your data.
© Shutterstock
21 / 30 Fotos
The FBI’s stance on ransom payments
- The FBI, CISA, and MS-ISAC "Do not encourage paying ransoms as payment does not guarantee victim files will be recovered."
© Shutterstock
22 / 30 Fotos
Why paying ransoms is discouraged
- Additionally, paying ransoms incentivizes cybercriminals to continue their operations.
© Shutterstock
23 / 30 Fotos
How ransomware is spread
- If you open an email attachment, click an ad, follow a link, or even visit a website embedded with malware, you may unknowingly be infected.
© Shutterstock
24 / 30 Fotos
Effects of ransomware on victims
- Ransomware attacks can be costly to businesses and individuals alike as it targets important information and data.
© Shutterstock
25 / 30 Fotos
How to report ransomware attacks
- If you live in the US and believe or know you're a victim, report ransomware attacks to ic3.gov, the FBI’s Internet Crime Complaint Center. Provide details of the attack as it helps authorities track ransomware groups and prevent future incidents.
© Shutterstock
26 / 30 Fotos
Protecting your devices from malware
- To protect yourself and avoid being exposed to ransomware or other malware, be cautious and avoid downloading software from unknown sources.
© Shutterstock
27 / 30 Fotos
Creating a cybersecurity continuity plan
- Whether you run a business or it's for your family, create a plan just in case you are ever a victim of a ransomware attack.
© Shutterstock
28 / 30 Fotos
Final recommendations from experts
- Keep operating systems, software, and applications up to date. Ensure anti-virus and anti-malware solutions are set to automatically update and run regular scans. Sources: (People) (FBI) (Britannica) (Fortune) (AL.com) See also: Elon Musk suggests Ukraine is behind 'massive cyber-attack' causing X disruptions
© Shutterstock
29 / 30 Fotos
© Shutterstock
0 / 30 Fotos
Ransomware threat
- According to warnings from multiple government agencies, a ransomware program has taken hundreds of victims' data hostage in exchange for a ransom.
© Shutterstock
1 / 30 Fotos
Medusa ransomware overview
- Since February 2025, Medusa, a "ransomware-as-a-service variant used to conduct ransomware attacks," has claimed over 300 victims.
© Shutterstock
2 / 30 Fotos
Government agencies’ warnings
- The FBI and US Cybersecurity and Infrastructure Security Agency are warning the world about the dangers of ransomware schemes, like Medusa.
© Shutterstock
3 / 30 Fotos
Ransomware-as-a-service model
- Medusa has since progressed to using an affiliate model, but the developers still control important operations such as ransom negotiation. This structure allows multiple cybercriminal groups to launch Medusa attacks while sharing profits with the original developers.
© Shutterstock
4 / 30 Fotos
Medusa’s attack techniques
- Since 2021, the ransomware-as-a-service provider has used phishing and other common ransomware techniques.
© Shutterstock
5 / 30 Fotos
Phishing as a primary attack method
- The main method used is phishing, according to CISA. These campaigns often impersonate legitimate organizations and trick users into clicking links that are actually malicious.
© Shutterstock
6 / 30 Fotos
Exploiting software vulnerabilities
- Medusa actors exploit unpatched software vulnerabilities to break into networks across many different industries. Keeping software updated is crucial, as attackers frequently target outdated systems.
© Shutterstock
7 / 30 Fotos
The double extortion model explained
- Medusa developers and affiliates use a double extortion model, where they “encrypt victim data and threaten to publicly release exfiltrated data if a ransom is not paid.” This pressures victims into paying even if they have backups in order to prevent public exposure.
© Shutterstock
8 / 30 Fotos
Medusa’s data-leak website
- There is a data-leak website run by Medusa that shows its victims and a countdown to the release of private information.
© Shutterstock
9 / 30 Fotos
Ransom payment structure
- Ransoms are demanded and posted on the site including direct links to Medusa-affiliated cryptocurrency wallets. The victims can pay US$10,000 in cryptocurrency to add time to the countdown timer.
© Shutterstock
10 / 30 Fotos
Industries affected by Medusa
- Critical sectors have been targeted, including medical, educational, and legal organizations. This has led to significant financial losses.
© Shutterstock
11 / 30 Fotos
Medusa’s evolution since 2021
- Medusa originally started as a closed ransomware variant. However, over the years, it has become a broader criminal enterprise.
© Shutterstock
12 / 30 Fotos
Recommended cybersecurity measures
- Officials recommended patching operating systems, software, and firmware and using multifactor authentication to protect against ransomware.
© Shutterstock
13 / 30 Fotos
Importance of software patching
- If your software isn't updated it can be exposed to more vulnerabilities. It's important to make sure operating systems and software are properly patched and up to date.
© Shutterstock
14 / 30 Fotos
Role of multifactor authentication
- If you're using webmail services such as Gmail or Microsoft Outlook or even VPNs, you should start using multifactor authentication. MFAs significantly reduce the risk of unauthorized entry.
© Shutterstock
15 / 30 Fotos
Risks of frequent password changes
- Experts warn against frequently recurring passwords as this can weaken security. Instead, you should have a unique password that is only changed when a breach is suspected.
© Shutterstock
16 / 30 Fotos
Best practices for password security
- Use long, unique passwords combined with multifactor authentication as it can add an extra layer of protection against credential theft. A password manager can help users generate and store complex passwords securely.
© Shutterstock
17 / 30 Fotos
Backing up important data
- Organizations specifically should store copies of more sensitive or crucial information on separate, physical devices and place them in extremely secure locations.
© Shutterstock
18 / 30 Fotos
Network segmentation for security
- Other steps for an organization might include segmenting networks as well as requiring a VPN for remote access.
© Shutterstock
19 / 30 Fotos
Using VPNs for remote access
- VPNs can help reduce the risk of unauthorized access and can enhance security overall.
© Shutterstock
20 / 30 Fotos
How to recognize ransomware attacks
- Normally, you won't realize your computer has been infected until it's too late. You may go to login and no longer have access to your data.
© Shutterstock
21 / 30 Fotos
The FBI’s stance on ransom payments
- The FBI, CISA, and MS-ISAC "Do not encourage paying ransoms as payment does not guarantee victim files will be recovered."
© Shutterstock
22 / 30 Fotos
Why paying ransoms is discouraged
- Additionally, paying ransoms incentivizes cybercriminals to continue their operations.
© Shutterstock
23 / 30 Fotos
How ransomware is spread
- If you open an email attachment, click an ad, follow a link, or even visit a website embedded with malware, you may unknowingly be infected.
© Shutterstock
24 / 30 Fotos
Effects of ransomware on victims
- Ransomware attacks can be costly to businesses and individuals alike as it targets important information and data.
© Shutterstock
25 / 30 Fotos
How to report ransomware attacks
- If you live in the US and believe or know you're a victim, report ransomware attacks to ic3.gov, the FBI’s Internet Crime Complaint Center. Provide details of the attack as it helps authorities track ransomware groups and prevent future incidents.
© Shutterstock
26 / 30 Fotos
Protecting your devices from malware
- To protect yourself and avoid being exposed to ransomware or other malware, be cautious and avoid downloading software from unknown sources.
© Shutterstock
27 / 30 Fotos
Creating a cybersecurity continuity plan
- Whether you run a business or it's for your family, create a plan just in case you are ever a victim of a ransomware attack.
© Shutterstock
28 / 30 Fotos
Final recommendations from experts
- Keep operating systems, software, and applications up to date. Ensure anti-virus and anti-malware solutions are set to automatically update and run regular scans. Sources: (People) (FBI) (Britannica) (Fortune) (AL.com) See also: Elon Musk suggests Ukraine is behind 'massive cyber-attack' causing X disruptions
© Shutterstock
29 / 30 Fotos
How to protect yourself from data stealing and ransom requests
What is ransomware?
© Shutterstock
Ransomware attacks pose an ever-increasing threat to businesses, organizations, and individuals alike. Cybercriminals are using evolving and sophisticated methods to infiltrate systems so they can then encrypt the data of the organization, business, or individual, essentially locking them out of their own devices. The victims must pay the ransom request to have their data returned to them.
One of the latest and most dangerous ransomware variants, Medusa, has already targeted hundreds of victims. Government agencies such as the FBI and CISA are warning against this threat and emphasizing the importance of proactive defense measures.
Curious about how you can stay safe from ransomware? Click through now.
RECOMMENDED FOR YOU




































MOST READ
- Last Hour
- Last Day
- Last Week