Medusa Ransomware is able to deactivate anti-Malware tools, so be on your guard


  • The researchers spotted the Ransomware operators of Medusa deployment of SMUOL.SYS
  • This driver imitates a legitimate crowdsstrike falcon pilot
  • Medusa actively targets critical infrastructure organizations

Ransomware Medusa operators engage in the old contribution of your vulnerable (byod), by bypassing the protection, detection and response tools (EDR) (EDR) (EDR) during the installation of the Encryptor.

Elastic Security Labs cybersecurity researchers noted that attacks begin while threat actors abandon an anonymous charger, which deploys two things on the target end: the vulnerable driver and the encryptor.

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top