Insecticidas en Estados Unidos

Published 4 min de lectura 100 reading

In recent months, the cyber threat from the North Korean State has taken a particularly worrying turn: a subgroup linked to the well-known Lazarus collective has begun to use the Medusa Ransomware against health organizations in the United States, in operations whose main objective is economic extortion. This news not only confirms the continuity of North Korean-label criminal campaigns, but also shows how these actors mix sophisticated techniques with public tools and "Ransomware as a service" services to maximize their impact.

Jellyfish is not a new family: appeared as operation RaaS in early 2021 and, over time, has committed hundreds of organizations in critical sectors. The important thing now is that security researchers have identified technical and tactical overlaps that point to the participation of a group within the umbrella of Lazarus - with possible connections to subgroups known in the community as Andariel or Stonefly - in attacks directed at health providers in the US. United States. If you want to read the technical report of the analysts who document these coincidences, you can review the entry published by Symantec on their company blog: Symantec Enterprise Blogs.

Insecticidas en Estados Unidos
Image generated with IA.

Researchers note that, along with the use of Medusa, attackers resort to a mix of utilities and backdoors: from credentials robbers for browsers and credentials overturning tools to remote access malware and custom proxys. Although many of these pieces are "commodity" - that is, available or reused by many groups - the combination and the use sequence help analysts draw relationships between incidents and attribute activity with greater confidence.

The financial impact also draws a pattern. Medusa's operations have recorded average bailouts of around $260,000, a significant figure when considering the scale and frequency of intrusions. Several previous government investigations and actions have documented how the gains from illicit cyber operations have been used to finance North Korean state activities, making these campaigns more than just economic crimes: they are sources of financing with possible geopolitical implications.

But beyond money, what concerns the security community and hospital administrators is the deliberate choice of target. Health care is a critical sector where interruption can put lives at risk; however, analysts stress that these groups do not show scruples in attacking hospitals or other sensitive services, even though such targets often generate intense public rejection. In the researchers' words, the transition to extortion pieces like Medusa evidence that the involvement of North Korean actors in cybercrime remains intense and with few ethical barriers.

If you are looking for accessible media coverage of this discovery, specialized media have published summaries that link to the original technical work and provide context about the victims and the evolution of Medusa: for example, you can see the note published in BleepingComputer: BleepingComputer on Lazarus and Medusa.

Insecticidas en Estados Unidos
Image generated with IA.

At the practical level, response team reports insist that organizations review commitment indicators (IoC) and detection procedures published by suppliers and government bodies, because early detection can avoid the encryption phase and the resulting data loss. Agencies such as the CISA offer general guides and resources on how to prepare for ransomware and respond to incidents; they are good references for operations teams and security officials: CISA - Ransomware. In addition, the FBI maintains material and recommendations on the threat of the ransomware on its site: FBI - Ransomware.

This new phase of state-of-the-art criminal activism leaves several clear lessons for the health sector and for any critical organization. The first is that exposure does not depend only on being "a technological company": health institutions live with networks of suppliers, connected medical devices and personnel handling sensitive information, which extends the attack surface. The second lesson is that the mix of commercial tools and publicly available code with customised developments makes attribution difficult, but does not make it impossible; the careful correlation of telemetry is what allows intelligence teams to link campaigns to specific actors.

In short, we are facing a scenario in which state-backed actors use the cybercrime business model - Ransomware in RaaS mode - to obtain resources, differentiate their arsenal and maintain pressure on sectors that could previously be considered "untouchable" for reputational reasons. The recommendation for any security officer is not to underestimate the threat: to update inventories, strengthen access controls, validate backup and work with intelligence teams to incorporate IoC and detection rules in the defence. Technical reports such as those published by detection and response teams, and notices from national agencies, should be used as an operational road map to reduce the exposure window and potential damage.

Coverage

Related

More news on the same subject.