Medusa Ransomware: A $15M Headache for Healthcare with a Side of Extortion
Medusa ransomware, operated by Spearwing, is making waves with demands from $100,000 to $15 million. This digital menace exploits unpatched vulnerabilities, especially on Microsoft Exchange Servers, deploying clever tools to evade detection. Yet, Medusa’s real sting lies in its ability to delete itself, leaving investigators scratching their heads.

Hot Take:
Medusa is taking the ransomware world by storm with a ransom range that could buy you anything from a modest home to a private island! While traditional RaaS groups like BlackCat and LockBit are getting cuffed by law enforcement, Medusa’s been putting in the overtime. It’s like the new hot tech startup, except instead of disrupting industries, it’s just plain disrupting. Move over, Silicon Valley, it’s all about Cyber Alley now!
Key Points:
- Medusa ransomware demands ransoms from $100,000 to $15 million.
- Spearwing, the group behind Medusa, capitalizes on the decline of other RaaS groups.
- Medusa employs double-extortion tactics using a playbook for affiliates.
- Victims face a $10,000 per day fee to extend the ransom deadline.
- Healthcare organizations have been prime targets for Medusa attacks in 2025.