Medusa ransomware is able to disable anti-malware tools, so be on your guard




  • Researchers spot Medusa ransomware operators deploying smuol.sys
  • This driver mimics a legitimate CrowdStrike Falcon driver
  • Medusa is actively targeting critical infrastructure organizations

Operators of the Medusa ransomware are engaging in old-fashioned bring-your-own-vulnerable-driver (BYOD) attacks, bypassing endpoint protection, detection and response (EDR) tools while installing the encryptor.

Cybersecurity researchers Elastic Security Labs noted the attacks start as the threat actors drop an unnamed loader, which deploys two things on the target endpoint: the vulnerable driver, and the encryptor.

https://cdn.mos.cms.futurecdn.net/st2poYMzk9HUKYST7oW7dU-1200-80.jpg



Source link

Latest articles

spot_imgspot_img

Related articles

spot_imgspot_img