More

    Medusa ransomware is able to disable anti-malware tools, so be on your guard




    • Researchers spot Medusa ransomware operators deploying smuol.sys
    • This driver mimics a legitimate CrowdStrike Falcon driver
    • Medusa is actively targeting critical infrastructure organizations

    Operators of the Medusa ransomware are engaging in old-fashioned bring-your-own-vulnerable-driver (BYOD) attacks, bypassing endpoint protection, detection and response (EDR) tools while installing the encryptor.

    Cybersecurity researchers Elastic Security Labs noted the attacks start as the threat actors drop an unnamed loader, which deploys two things on the target endpoint: the vulnerable driver, and the encryptor.

    https://cdn.mos.cms.futurecdn.net/st2poYMzk9HUKYST7oW7dU-1200-80.jpg



    Source link

    Latest articles

    spot_imgspot_img

    Related articles

    Leave a reply

    Please enter your comment!
    Please enter your name here

    spot_imgspot_img