

Multiple Netgear Ex6200 Firmware Vulnerabilities
May 1, 2025
Multiple Microsoft Azure Vulnerabilities
May 1, 2025
Multiple Netgear Ex6200 Firmware Vulnerabilities
May 1, 2025
Multiple Microsoft Azure Vulnerabilities
May 1, 2025Severity
High
Analysis Summary
A RaaS (Ransomware-as-a-Service) variant dubbed MedusaLocker first surfaced in 2019. The majority of MedusaLocker ransomware threat actors acquire access to victim systems via vulnerable Remote Desktop Protocol (RDP) configurations. The threat actors also utilize email phishing and spam email campaigns as initial intrusion vectors, directly attaching the ransomware to the email. A batch file is used by the MedusaLocker ransomware to run the PowerShell script invoke-ReflectivePEInjection. By editing the EnableLinkedConnections setting in the infected system's registry, this script spreads MedusaLocker over the network. The infected machine then detects attached networks and hosts through Internet Control Message Protocol (ICMP) and shared storage via Server Message Block (SMB) Protocol.
MedusaLocker avoids executable files, most likely to prevent leaving the targeted machine inoperable until the ransom is paid. It employs AES and RSA-2048 encryption and appends extensions such as .encrypted, .bomber, .boroff, .breakingbad, .locker16, .newlock, .nlocker, and .skynet.
MedusaLocker perpetrators insert a ransom note into the folders that contain a file holding the victim's encrypted data. The message explains how to contact the MedusaLocker threat actors, usually by providing victims with one or more email addresses. The magnitude of MedusaLocker ransom demands appears to fluctuate according to the actors' perception of the victim's financial situation or status.
It is important to note that paying the ransom does not guarantee that the decryption key will be provided, and it may also encourage further attacks. Instead, it is recommended to try and recover the data using backup copies or seek the help of a professional cybersecurity firm. To protect against Medusa Locker Ransomware and other types of ransomware, it is important to keep antivirus software and operating systems up to date, avoid opening suspicious email attachments or downloading software from untrusted sources, and regularly back up important data.
Ransom Note:

Impact
- File Encryption
- Financial Loss
Indicators of Compromise
MD5
- bd29231bc4f2c6d2f22fa026e2eaca40
- 6b0631f823e171da4b7e9350f61a0536
- 49b53d3c715ec879efeb51d386b9d923
- 47386ee20a6a94830ee4fa38b419a6f7
- d0706d40e65e2dc6452c2279a4ab882c
SHA-256
- 1bad2b6e8ab16c5a692b2d05f68f7924a73a5818ddf3a9678ca8caab3568a78e
- 2e62a782c84149953dd216d96fec8e0f4d4b568525bbaa0574b1aad2530d28e0
- 3e19d1653c08206c55e1f835bd890b067b652b99a7b38bad4d78ad7490c6a0f8
- 736de79e0a2d08156bae608b2a3e63336829d59d38d61907642149a566ebd270
- d174cf908b7bcee10cc0458955554e5ba81beffd8544ae95a427fff643a41c86
SHA1
- f037584c363d566aa69b7307471012247707bb4c
- 67628a2a2a44c52d48c2de9e6fa696c6b5f7cdc4
- 78daa8b99d2fa422926465f36e13f31587b9e142
- ee4575cf9818636781677d63236d3dc65652deab
- ec2d49b0e6245620b05bfc4a6814e5b6d1f8f258
Remediation
- Block all threat indicators at your respective controls.
- Search for indicators of compromise (IOCs) in your environment utilizing your respective security controls.
- Maintain cyber hygiene by updating your anti-virus software and implementing a patch management lifecycle.
- Along with network and system hardening, code hardening should be implemented within the organization so that their websites and software are secure. Use testing tools to detect any vulnerabilities in the deployed codes.
- Enable two-factor authentication.
- Implement network segmentation and keep offline backups of data to guarantee minimal downtime for the organization.
- Updates for operating systems, applications, and firmware should be installed as soon as possible.
- Check the active directories, servers, workstations, and domain controllers for new or unfamiliar accounts.
- To create safe distant connections, consider installing and utilizing a virtual private network (VPN).