SHARE

Beware Of New Data Stealing Scheme, Feds Warn

A dangerous ransomware program has taken data from hundreds of victims hostage—and more could be at risk, according to a warning from multiple federal agencies.

Computer

Computer

Photo Credit: Pixabay/Welcome to All ! ツ

Medusa, a ransomware-as-a-service variant, has been used in attacks on critical infrastructure sectors, impacting more than 300 known victims, according to a joint cybersecurity advisory from the Cybersecurity and Infrastructure Security Agency (CISA), the FBI, and the Multi-State Information Sharing and Analysis Center (MS-ISAC).

The ransomware, which first emerged in 2021, uses common attack methods such as phishing emails and exploiting unpatched software vulnerabilities to gain access to victims' systems, according to the advisory. Targets have included medical facilities, schools, law firms, and tech companies.

Originally a closed ransomware operation, Medusa has since evolved into a more aggressive model, with growing capabilities—and more sophisticated tactics required to stop it.

Who Is At Risk?

Authorities are urging users of popular webmail services like Gmail and Outlook—as well as anyone using Virtual Private Networks (VPNs)—to take immediate steps to protect their accounts.

One of the most effective defenses, the advisory states, is multifactor authentication (MFA)—a security feature that requires a unique code sent via text, email, or an app before granting access to an account.

How To Protect Yourself

To minimize the risk of ransomware attacks, CISA, the FBI, and MS-ISAC recommend:

  • Updating operating systems and software to patch vulnerabilities.
  • Segmenting networks to prevent hackers from spreading within a system.
  • Blocking untrusted traffic to reduce exposure to cyber threats.

More details—including a full list of recommended actions—are available in the official cybersecurity advisory here.

Check back to Daily Voice for updates.

to follow Daily Voice Germantown and receive free news updates.

SCROLL TO NEXT ARTICLE