Inside Medusa Ransomware: Tactics, Targets, and Trends in Recent Operations
In‑depth analysis of recent Medusa ransomware group operations, victim data and extortion schemes.
In‑depth analysis of recent Medusa ransomware group operations, victim data and extortion schemes.
The Medusa ransomware group, first identified in mid‑2021 as a ransomware‑as‑a‑service (RaaS) actor, has remained an active threat through 2025, adapting its operational model and targeting a broad range of victims across sectors. According to joint advisories from the U.S. Cybersecurity and Infrastructure Security Agency (CISA), Federal Bureau of Investigation (FBI), and Multi‑State Information Sharing and Analysis Center (MS‑ISAC), Medusa actors have compromised hundreds of organizations, employing a combination of credential theft, exploitation of unpatched vulnerabilities, and network enumeration to achieve initial access and lateral movement.
In addition to encrypting data, Medusa actors deploy double extortion techniques—threatening to publish stolen data unless ransom demands are met, and in some cases engaging in triple extortion behaviors where additional demands are made after an initial payment.
This article examines the organizational structure of Medusa’s operations, common attack vectors, extortion tactics, recent victimology from November and December 2025, and implications for defenders and incident responders.
Medusa’s operational model typifies modern RaaS structures where core developers provide the ransomware payloads and infrastructure, while a network of affiliates—often recruited through cybercrime forums or via initial access brokers (IABs)—execute attacks against victims.
The affiliate model expands attack volume while decentralizing effort; Medusa’s developers retain central control over ransom negotiations and data leak infrastructure (e.g., dark web leak sites and messaging channels), effectively monetizing both encryption and stolen data sales. Affiliates are incentivized through revenue sharing and referrals, a typical arrangement within RaaS ecosystems.
Medusa actors also engage IABs to obtain validated network access, often acquiring stolen credentials or footholds established through phishing, brute force, or exploitation of remote access vulnerabilities. This division of labor increases operational efficiency and complicates attribution.
Medusa’s initial access methods include:
Victim selection reflects a focus on organizations with substantial digital assets and sensitive data, including healthcare, education, legal, manufacturing, and service providers. The operational calculus for Medusa (and similar RaaS groups) prioritizes entities likely to meet ransom demands due to regulatory, reputational, or operational pressures.

Medusa’s extortion framework centers on three components:
Medusa’s negotiations surfaced structured options presented to victims after initial ransomware deployment:
This tiered approach signals a bifurcation of extortion pressure and direct monetization to prospective buyers of stolen information.
Medusa’s activities through November and December 2025 illustrate persistence and operational scaling. Published leaks have included personally identifiable information (PII), passport scans, confidentiality agreements, financial records (e.g., balance sheets, payments, contracts), and client or buyer lists. These categories of data heighten confidentiality concerns and complicate recovery and regulatory reporting obligations.

In November 2025, we identified at least 11 victims, with data from 10 publicly disclosed by the group:
In December 2025, Medusa’s victimology continued with at least three new entities:
This distribution underscores Medusa’s targeting diversity across geographies and industry verticals and confirms that smaller enterprises remain within scope alongside larger institutional targets.
The Medusa ransomware group’s continued activity through late 2025 demonstrates the enduring risk posed by RaaS operations leveraging affiliate ecosystems, credential compromise, and multi‑vector extortion techniques. Recent incidents across diverse industries highlight that both large and small organizations are susceptible to compromise. Defensive strategies rooted in fundamental cybersecurity hygiene—patching, segmentation, identity protection, and incident readiness—remain central to reducing exposure and mitigating impact. Proactive engagement, paired with robust response frameworks, enables organizations to withstand and recover from ransomware incidents that mirror Medusa’s evolving tactics.
Key Takeaways:
As ransomware operations continue to evolve, cybersecurity practitioners must remain vigilant, implementing proactive defense strategies while maintaining robust incident response capabilities. The Medusa threat underscores the critical importance of layered security controls, regular security assessments, and organizational preparedness in an increasingly hostile cyber landscape.
References