Cybersecurity and Infrastructure Security Agency’s Post

We released a joint Cybersecurity Advisory (CSA) with the Federal Bureau of Investigation (FBI), the Department of the Treasury, and the Financial Crimes Enforcement Network (FinCEN) that provides technical details on the use of MedusaLocker ransomware by threat actors, observed as recently as May 2022: go.usa.gov/xJtxZ The CSA also provides recommended actions, mitigations, and indicators of compromise (IOCs) that can be used by organizations to reduce their risk to this ransomware variant. MedusaLocker relies predominantly on exploiting unpatched vulnerabilities in Remote Desktop Protocol to gain access to victims’ networks. It also frequently uses email phishing and spam email campaigns, with malware directly attached to the email, as initial intrusion vectors. Some of the actions that executives and leaders can take today to mitigate cyber threats from ransomware are to prioritize patching known exploited vulnerabilities, train users to recognize and report phishing attempts, and enforce multifactor authentication. Review the CSA for other actions that can be taken as well as a listing of IOCs: go.usa.gov/xJtxZ

  • No alternative text description for this image

To view or add a comment, sign in

Explore topics