The Medusa ransomware gang has launched attacks against over 300 critical infrastructure organizations, hitting sectors ranging from healthcare and education to technology and government agencies, according to a joint advisory from the FBI, CISA, and MS-ISAC.
Medusa, a ransomware-as-a-service (RaaS) operation, first emerged in June 2021 and has since continued its rampage by exploiting phishing attacks and unpatched vulnerabilities to gain access to victim networks.
Targeting Critical Sectors with Exploited Vulnerabilities
The latest advisory highlights how Medusa affiliates are actively exploiting:
- CVE-2024-1709 – A critical vulnerability in ScreenConnect, a popular remote access tool.
- CVE-2023-48788 – A flaw affecting security products from Fortinet.
These vulnerabilities, if left unpatched, provide attackers with easy access to infiltrate systems, encrypt data, and demand ransom payments.
Inside Medusa’s Ransomware Operation
Unlike other ransomware groups, Medusa operates as an exclusive group of developers and hackers while recruiting affiliates through cybercriminal forums and marketplaces.
- Affiliates are offered between $100 and $1 million per attack, depending on the scale of the target.
- Initial access brokers (IABs) are hired to infiltrate victims before the core Medusa team handles ransom negotiations.
- Victims have 48 hours to respond before hackers escalate by directly contacting them via phone or email.
- The group’s leak site allows them to auction off stolen data to the highest bidder.
In some cases, Medusa actors have double-crossed victims, demanding additional payments even after the ransom has been paid. The advisory warns of a triple extortion tactic, where one Medusa actor falsely claims that the previous negotiator stole the payment and demands another sum for the “true decryptor.”
High-Profile Attacks: Governments, Schools, and Corporations
Medusa first gained widespread attention in 2023 after hacking Minneapolis Public Schools, leaking sensitive student records of over 100,000 people.
Since then, it has expanded its attacks globally, hitting:
- Tonga’s government infrastructure
- Municipalities in France
- The Philippine government
- A tech firm linked to Canada’s largest banks
- State and local agencies in Illinois and Texas
The gang even claimed to have breached Aurora, Colorado, though local officials disputed the attack.
The Growing Threat of Medusa Ransomware
With ransomware continuing to be one of the most lucrative and destructive cyber threats, Medusa’s rapid expansion proves that no sector is safe from cyber extortion.
U.S. cybersecurity agencies are urging organizations to immediately patch vulnerabilities, strengthen email security, and implement robust backup strategies to mitigate the risk.
As Medusa continues to refine its tactics, the fight against ransomware remains a critical battle for governments, businesses, and critical infrastructure worldwide.
Help us bring real change! Corporate lobbying has corrupted our system for too long, and it’s time to take action. Please sign and share this petition—your support is crucial in restoring accountability to our government. Every signature counts! Thank you!
https://www.ipetitions.com/petition/restore-our-republic-end-lobbying

Support truth, health, and preparedness by shopping the Alex Jones Store through our link. Every purchase helps sustain independent voices and earns us a 10% share to fuel our mission. Shop now and make a difference!
https://thealexjonesstore.com?sca_ref=7730615.EU54Mw6oyLATer7a


