Medusa Ransomware Targets 300+ Critical Infrastructure Organizations

As of February 2025, the Medusa ransomware gang has successfully attacked over 300 organizations in critical infrastructure sectors worldwide. Security researchers tracking the group confirm that its primary targets include energy providers, healthcare institutions, and public service organizations, significantly disrupting essential services.

Medusa operates a double-extortion model, exfiltrating sensitive data before encrypting systems and threatening public leaks unless a ransom is paid. The gang has also expanded its arsenal, exploiting newly disclosed vulnerabilities in enterprise software, such as VMware ESXi (CVE-2024-3400) and Fortinet FortiOS (CVE-2024-4512). Its tactics now involve initial access through compromised remote desktop protocols (RDP) and phishing attacks targeting IT administrators.

Despite global law enforcement efforts, Medusa continues to thrive, leveraging cryptocurrency laundering techniques and affiliate partnerships to distribute attacks at scale. The group has increased its ransom demands, often exceeding $1 million per victim, placing additional pressure on targeted organizations.

Expert Analysis:


Medusa’s persistent targeting of critical infrastructure signals a shift from financially motivated ransomware towards operations with broader geopolitical and economic consequences. The sheer number of victims within essential service sectors raises concerns about whether this group is acting purely for profit or if state-backed entities are exploiting its operations for strategic disruption.

Read the full article here.

Stay informed with us!

You can subscribe to our monthly cybersecurity newsletter to receive updates about us and the industry

Blog

Check the latest updates on threats, stories, events and analysis.

X Outages Blamed on Cyberattack by Dark Storm

Switzerland Mandates Cyberattack Reporting for Critical Infrastructure

China-Linked Silk Typhoon Expands Cyber Attacks to IT Supply Chains