Medusa ransomware group using zero-days to launch attacks within 24 hours of breach, Microsoft says
好的,我现在需要帮用户总结一篇文章,控制在100字以内。用户已经提供了文章内容,我得先仔细阅读并理解主要内容。 文章主要讲的是微软的研究发现,Medusa勒索软件团伙正在利用新漏洞进行攻击,这些漏洞在公开披露之前就被他们利用了。他们特别针对暴露在外的网络系统,在漏洞被披露和补丁广泛应用之间的时间窗口内发起攻击。微软提到Medusa行动迅速,能在24小时内完成从初始访问到数据外泄和部署勒索软件的过程。此外,Medusa还使用合法的远程管理工具,并且他们的活动主要影响医疗、教育、专业服务和金融行业。微软还提到这两个CVE漏洞被用于攻击,并建议组织了解自己的数字足迹以防御攻击。最后,Medusa被认为与俄罗斯有关,并且他们经常攻击美国的医疗机构和市政机构。 现在我需要将这些信息浓缩到100字以内,同时避免使用“这篇文章”或“文章内容总结”这样的开头。重点包括:Medusa利用新漏洞进行攻击,微软的研究发现,他们的高效行动方式,针对的行业以及CVE漏洞的例子。 可能的结构是:微软指出Medusa利用新漏洞,在公开前攻击;行动迅速,影响多个行业;举例CVE-2026-23760和CVE-2025-10035被用于攻击;建议组织加强防御。 这样可以确保信息全面且简洁。 </think> 微软研究显示,Medusa勒索软件团伙正利用新漏洞在公开前发动攻击,尤其针对暴露网络系统。该团伙行动迅速,在24小时内完成入侵、数据外泄及勒索软件部署。最近利用SmarterMail和GoAnywhere的未公开漏洞对医疗、教育、金融等行业造成重大影响。专家建议组织加强防御以应对此类威胁。 2026-4-6 20:16:3 Author: therecord.media(查看原文) 阅读量:20 收藏

The Medusa ransomware operation is increasingly exploiting new vulnerabilities days before they are publicly disclosed, according to new research from Microsoft.

Cybersecurity experts at Microsoft published an examination of activity from the group — which recently claimed responsibility for a devastating attack on the largest hospital in Mississippi and a county in northern New Jersey. 

Microsoft said it has been alarmed to see how effective Medusa actors are, citing multiple cases where the group can move from initial access to data exfiltration and ransomware deployment within 24 hours. 

Medusa actors also make a point of targeting vulnerable web-facing systems during the window between vulnerability disclosure and widespread patch adoption.

“The threat actor’s high operational tempo and proficiency in identifying exposed perimeter assets have proven successful, with recent intrusions heavily impacting healthcare organizations, as well as those in the education, professional services, and finance sectors in Australia, United Kingdom, and United States,” Microsoft explained. 

Incident responders have seen Medusa hackers break into systems and immediately create new user accounts to preserve their access. 

While many attacks have lasted just 24 hours, Medusa incidents typically run for five to six days and rely heavily on legitimate remote management tools like ConnectWise ScreenConnect, AnyDesk and SimpleHelp.

A Microsoft spokesperson told Recorded Future News that the incidents are part of a growing trend where ransomware attackers weaponize vulnerabilities almost immediately.

The Microsoft blog highlights two recent bugs — CVE-2026-23760 in SmarterMail and CVE-2025-10035 in GoAnywhere Managed File Transfer — as examples of Medusa actors exploiting vulnerabilities one week before public disclosure. 

The Cybersecurity and Infrastructure Security Agency (CISA) previously confirmed that CVE-2026-23760 and CVE-2025-10035 have been used in ransomware attacks. Microsoft said as ransomware attackers become more adept at identifying new vulnerabilities, it will be important for organizations to understand their digital footprint before it's too late to defend against perimeter network attacks.

Experts believe the Medusa operation is based in Russia due to its avoidance of targets in the Commonwealth of Independent States, its Russian-language forum activity and the use of Cyrillic script in operational tools.

The group, which emerged in 2021, has repeatedly shown a willingness to target healthcare facilities and municipal governments across the U.S. 

The group most recently claimed attacks on New Jersey’s Passaic County and the University of Mississippi Medical Center (UMMC). The hospital fully reopened on March 2 with the help of the FBI and Department of Homeland Security. 

Cybersecurity experts at Symantec also recently said they saw members of Lazarus — a well-known North Korean hacking operation housed within the country’s military — deploy Medusa ransomware.

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

Recorded Future

No previous article

No new articles

Jonathan Greig

Jonathan Greig

is a Breaking News Reporter at Recorded Future News. Jonathan has worked across the globe as a journalist since 2014. Before moving back to New York City, he worked for news outlets in South Africa, Jordan and Cambodia. He previously covered cybersecurity at ZDNet and TechRepublic.


文章来源: https://therecord.media/medusa-ransomware-group-zero-days-microsoft
如有侵权请联系:admin#unsafe.sh