Tech

Medusa ransomware is able to disable anti-malware tools, so be on your guard

Share
Share


  • Researchers spot Medusa ransomware operators deploying smuol.sys
  • This driver mimics a legitimate CrowdStrike Falcon driver
  • Medusa is actively targeting critical infrastructure organizations

Operators of the Medusa ransomware are engaging in old-fashioned bring-your-own-vulnerable-driver (BYOD) attacks, bypassing endpoint protection, detection and response (EDR) tools while installing the encryptor.

Cybersecurity researchers Elastic Security Labs noted the attacks start as the threat actors drop an unnamed loader, which deploys two things on the target endpoint: the vulnerable driver, and the encryptor.

Share

Leave a comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Related Articles
This 122TB SSD costs ,400, but could shrink data centers and their power bills forever
Tech

This 122TB SSD costs $12,400, but could shrink data centers and their power bills forever

Solidigm’s 122.88TB SSD may not be the fastest, but it wins on...

A new tool predicts when users will reject a new technology
Tech

A new tool predicts when users will reject a new technology

If you can predict that a new technology will not be adopted,...

This futuristic dual-screen laptop looks incredible, but one disappointing flaw might ruin it for power users
Tech

This futuristic dual-screen laptop looks incredible, but one disappointing flaw might ruin it for power users

Aura Ultrabook Dual 14″ Touch is perfect for presentations and scrolling through...

Two-actuator robot combines efficient ground rolling and spinning flight in one design
Tech

Two-actuator robot combines efficient ground rolling and spinning flight in one design

Weight breakdown of the ATOM prototype. The battery and the frame contribute...