

GuLoader Malspam Campaign – Active IOCs
March 11, 2025
Multiple WordPress Plugins Vulnerabilities
March 11, 2025
GuLoader Malspam Campaign – Active IOCs
March 11, 2025
Multiple WordPress Plugins Vulnerabilities
March 11, 2025Severity
High
Analysis Summary
The Medusa ransomware group has claimed nearly 400 victims since its emergence in January 2023, with attacks rising 42% from 2023 to 2024. In early 2025, the group launched over 40 attacks, according to research team, which tracks it as Spearwing. Medusa operates a double extortion model, stealing data before encrypting systems and threatening to leak it if victims refuse to pay ransoms ranging from $100,000 to $15 million.
Following disruptions to LockBit and BlackCat, Medusa appears to be filling the gap, alongside other emerging ransomware-as-a-service (RaaS) groups like RansomHub, Play, Qilin, Anubis, CipherLocker, and Xelera. The group's primary targets include healthcare, non-profits, financial institutions, and government organizations.
Medusa gains initial access by exploiting vulnerabilities in public-facing applications, especially Microsoft Exchange Server, and likely collaborates with initial access brokers. Once inside, attackers deploy remote management tools like SimpleHelp, AnyDesk, and MeshAgent for persistence and use Bring Your Own Vulnerable Driver (BYOVD) techniques via KillAV to disable antivirus defenses.
They also leverage PDQ Deploy for lateral movement and drop additional tools such as Navicat for database access, RoboCopy, and Rclone for data exfiltration. Symantec emphasizes that Spearwing attacks large organizations across multiple sectors, prioritizing financial gain over ideological motives. The ransomware landscape remains in flux, with Medusa capitalizing on recent disruptions to established cybercriminal groups.
Impact
- Security Bypass
- Financial Loss
- Data Exfiltration
Indicators of Compromise
MD5
e6f8eff9b25e4bed709a188db459587d
f4f22e22520cd80ca5d56fccac0aa619
7cfefe093b45ee763c047585ccd9c43e
8ff1f8563f3374db82b1d790fa9dd51e
9e82ee5bde6b5d29281a3c280e6d1f2e
03af2bf85923ce0fda7c20f8f82839c9
9f829f7343d5d5da7c397fa6efda4a4e
SHA-256
c28fa95a5d151d9e1d7642915ec5a727a2438477cae0f26f0557b468800111f9
dbe480495be5abc23437b5e916fa0368c617e4dbd58d9ed7ea303b102a6dc3b1
b1553dfee1da93fd2dedb0755230ce4e21d4cb78cfc369de29d29d04db1fe013
5f9d864d11c79b34c4502edba7d0e007197d0df086a6fb9d6bfda84a1771ff0f
b7703a59c39a0d2f7ef6422945aaeaaf061431af0533557246397551b8eed505
df6cb5199c272c491b3a7ac44df6c4c279d23f7c09daed758c831b26732a4851
9632d7e4a87ec12fdd05ed3532f7564526016b78972b2cd49a610354d672523c
SHA1
5a55edf81ace94378e9d1349c76c1d68e5f3cdbc
a220fdb0bb8af79f9ccfeeb1d007181cfadbd612
a17689181b789724ae47f9e6646ab732064c3dd3
5dba3d91c5347e7bb9afd6a0ece4204f97f47a18
75f85caea52fe5a124fa77e2934abd3161690add
54547180a99474b0dba289d92c4a8f3eea78b531
211500fa181ee200bf9bdd42a1ab0288a7f0cf69
Remediation
- Regularly update and patch vulnerabilities, especially in public-facing applications like Microsoft Exchange Server.
- Implement strong authentication (MFA) and limit administrative privileges.
- Deploy advanced EDR/XDR solutions to detect and block malicious activities.
- Restrict lateral movement by segmenting critical systems.
- Audit and restrict the use of remote management software like PDQ Deploy, AnyDesk, and SimpleHelp.
- Maintain offline, encrypted backups and test restoration processes regularly.
- Stay updated on emerging ransomware tactics and IOCs (Indicators of Compromise).
- Conduct regular cybersecurity awareness training to prevent phishing and social engineering attacks.
- Develop and test an incident response plan to quickly mitigate attacks.
- Enforce a zero-trust architecture to minimize unauthorized access risks.