Tech

Medusa ransomware is able to disable anti-malware tools, so be on your guard

Share
Share


  • Researchers spot Medusa ransomware operators deploying smuol.sys
  • This driver mimics a legitimate CrowdStrike Falcon driver
  • Medusa is actively targeting critical infrastructure organizations

Operators of the Medusa ransomware are engaging in old-fashioned bring-your-own-vulnerable-driver (BYOD) attacks, bypassing endpoint protection, detection and response (EDR) tools while installing the encryptor.

Cybersecurity researchers Elastic Security Labs noted the attacks start as the threat actors drop an unnamed loader, which deploys two things on the target endpoint: the vulnerable driver, and the encryptor.

Share

Leave a comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Related Articles
Can the Trump Mobile T1 Phone really be ‘made in the USA’? Here’s what experts say
Tech

Can the Trump Mobile T1 Phone really be ‘made in the USA’? Here’s what experts say

The Trump Organization says a new T1 Phone will launch in August...

This wild RTX 5080 packs a hidden SSD and wants to become your AI development powerhouse
Tech

This wild RTX 5080 packs a hidden SSD and wants to become your AI development powerhouse

Asus RTX 5080 now doubles as AI hardware and a surprisingly cool...

Flint 3 matches Wi-Fi 7 rivals on specs but undercuts them on price for early adopters
Tech

Flint 3 matches Wi-Fi 7 rivals on specs but undercuts them on price for early adopters

GL.iNet Flint 3 is a powerful Wi-Fi 7 router with 2.5GbE ports...

This 122TB SSD costs ,400, but could shrink data centers and their power bills forever
Tech

This 122TB SSD costs $12,400, but could shrink data centers and their power bills forever

Solidigm’s 122.88TB SSD may not be the fastest, but it wins on...