Medusa Ransomware

Facing a Ransomware Attack or Security Breach?

When you're under threat, every second counts. If your systems have been compromised or you need urgent assistance, get in touch with us straight away.

Medusa ransomware was first identified in June 2021 and has quickly become a major cybersecurity threat. In February 2023, it escalated its impact by introducing a dedicated data leak site. 

When your systems are infected with Medusa (or any form of ransomware), you will typically see a notification similar to the one displayed here, signalling that a cybercrime group is demanding a ransom to release your compromised systems and stolen data. 

Why You Should Never Interfere with a Ransomware Incident 

Imagine discovering a break-in at your office; your immediate reaction would likely be to call the police, refrain from touching anything, and allow authorities to gather evidence. 

A cyberattack demands the same level of caution. Your compromised digital environment is a crime scene, and it’s critical that you leave it undisturbed for forensic investigation. 

This isn't a task for your IT team or Managed Service Provider (MSP). Digital Forensic experts are available around the clock, much like law enforcement at the scene of a physical crime. 

Medusa ScreenA PC Monitor

If you come across a ransom message on your system, such as the one shown, you are likely dealing with a Medusa attack. 

DO NOT ATTEMPT TO INTERACT WITH, RESTORE, OR OVERWRITE ANY DATA.

What is Medusa? How Does It Operate?

Medusa ransomware was first identified in June 2021 and has since become a major cyber threat, growing significantly in prominence with the establishment of a dark web data leak site in February 2023. This development marked an escalation in its operations. Medusa is particularly notorious for its high-profile attacks on large corporations in the United States. It follows the Ransomware-as-a-Service (RaaS) model, partnering with affiliates across the globe to enhance the scope of its attacks. 

Medusa is recognised for its sophisticated techniques, with each infected file being marked by unique extensions, including the ".MEDUSA" identifier. The ransomware employs a double extortion strategy, both encrypting and exfiltrating data. While phishing emails are the primary method of infection, the group has also used initial access brokers to assist in breaching networks. Once inside, Medusa targets vulnerable public-facing systems, such as unpatched Microsoft Exchange servers, to further its attacks. 

UK Data 2025

How Does Medusa Attack? 

Medusa employs a malicious technique known as double extortion to escalate the pressure and urgency of their ransom demands. In this approach, the attackers not only encrypt the targeted data but also threaten to expose or sell it if the ransom is not paid. 

How Long Has Medusa Been Active and How Many Attacks Have Occurred? 

Medusa Ransomware was first detected in June 2021. Since then, it has successfully targeted 467 victims worldwide. 

 

With round-the-clock availability every day of the year, Solace Cyber has delivered Digital Forensic Incident Response services across hundreds of successful recovery operations in Australia. 

Most Recent Medusa Attacks
TitleAvailableLast visitfqdnScreenshots
No2025-06-01 21:20:38.516432http://hupxs7ps7md24kpz4lwsbra64abgxjx3pcc2wuca5ibawf2g5hlpfyqd.onion
Human VerifyYes2026-02-24 04:31:44.725262http://xfv4jzckytb4g3ckwemcny3ihv4i5p4lqzdpi624cxisu35my5fwi5qd.onion
Human VerifyNo2025-06-01 21:20:27.910291http://cx5u7zxbvrfyoj6ughw76oa264ucuuizmmzypwum6ear7pct4yc723qd.onion

Solace Cyber’s track record includes hundreds of successful response recoveries, providing Digital Forensic Incident Response services, 24x7x365.

“The average annual cost of cybercrime for UK businesses is estimated at approximately £15,300 per victim.”

Read more...

Steps After a Security Breach 

When a cyber incident occurs, take these immediate actions: 

  • Contact your business insurance provider straight away 
  • Review your business continuity plan to determine which operations can continue without your usual systems and data 
  • Document the incident for regulatory compliance purposes 

Solace Cyber acts as your specialist digital forensics partner in Australia, helping restore normal operations swiftly. Our response includes: 

  • Securing and isolating your environment to preserve evidence for thorough forensic analysis 
  • Tracking down where your data has been copied and executing legal removal requests 
  • Mapping out recovery points for your data, applications and systems, then carefully reconstructing them in a secure, clean environment 
  • Coordinating directly with your insurance provider and law enforcement as required 
  • Providing guidance on customer communication regarding the incident 
  • Reconstructing your infrastructure, recovering your data and returning you to complete operational status 

Recovery timelines typically range from 2 weeks to 2 months, depending on the incident's scope. 

Ransom Groups Stats by Industry

Critical infrastructure ransomware attacks 2021 bar chart

Who Is Solace Cyber and What Experience Do They Have in Recovering from Medusa Ransomware Attacks?

Solace Cyber delivers global risk and security services across Australia, specialising in travel, crisis support, and offshore risk management. The organisation runs a fully staffed security operations centre around the clock and maintains an internal intelligence unit that produces routine daily and weekly updates. The business is certified to ISO 27001, ISO 14001, ISO 45001, and ISO 9001 standards. 

Founded in the UK in 2021, Solace Cyber has grown its presence throughout Australia, concentrating on cyber incident handling, including digital forensics, incident response, ransomware events, information security, and wider risk management, supported by managed security services. The senior leadership team has more than two decades of combined experience across security and IT. 

Solace Cyber Stats

s

Successful breach recoveries

Users recovered in largest ransomware case
We have NEVER paid a ransom
Designed automation tools to reduce costs

%+

Incident Response
delivered via our Insurance
Partners

Facing a Ransomware Attack or Security Breach?

When you're under threat, every second counts. If your systems have been compromised or you need urgent assistance, get in touch with us straight away.

What Makes Solace Cyber Better Equipped Than Internal IT Teams For Ransomware Recovery? 

Specialist forensic investigation and secure restoration demand focused expertise that standard IT departments rarely possess. Your internal teams excel at day-to-day technology support, but ransomware response requires dedicated capabilities they typically lack. 

Consider these key challenges facing in-house teams: 

  • Most internal IT staff lack the specialised training needed to tackle advanced encryption attacks 
  • Pressure to resume operations quickly can lead teams to restore systems prematurely, compromising vital forensic evidence 
  • Without thorough investigation, recovery may reintroduce the same vulnerabilities, leaving your business exposed to repeated attacks 
  • The cybersecurity skills shortage intensified throughout 2022, with CSIRT* positions remaining critically understaffed 
  • Threat actors have become significantly more sophisticated since 2024 
Cyber security specialist on pc
Office

We created Solace Cyber specifically to address ransomware incidents through our structured 6-phase methodology: 

  1. Triage 
  1. Analysis 
  1. Contain and Mitigate 
  1. Remediate and Eradicate 
  1. Recover 
  1. Post-Incident Examination 

Our comprehensive forensic investigation begins at phase 2, forming the foundation of your business continuity plan. This detailed analysis proves essential for: 

  • Pinpointing when the initial compromise occurred 
  • Mapping the full scope of system infiltration 
  • Assessing data theft implications for compliance requirements 
  • Guaranteeing complete removal of attacker access and malicious tools 

We execute our evidence examination according to a carefully structured protocol designed to identify root causes quickly. This discovery directly informs our eradication strategy and recovery plan, while building the evidence base for potential legal action. Through legal proceedings, we can help secure court orders preventing criminals from publishing your data, effectively nullifying their ransom demands. 

Throughout your incident response, our Digital Forensic and Incident Response specialists maintain continuous coordination. Your dedicated Incident Manager and technical leads deliver regular progress updates, manage risk documentation, and operate within your change control frameworks from initial triage through final recovery. 

Key Take Aways

  • Access Denial: Your systems and data will be locked and inaccessible. 
  • Immediate Steps: Power off all devices, including PCs, and disconnect from the internet to prevent additional damage. 
  • Email and Communication Vulnerabilities: Your Office 365 account could be compromised, allowing attackers to intercept your communications. Avoid using your main email or team messaging tools during this time. 
  • Pre-Attack Breach: Cyber attackers may infiltrate your systems 2-4 weeks before the attack becomes apparent, potentially extracting data during this period without detection. 
  • Ransom Demands: Ransom demands could range anywhere from £500,000 to £3 million. 
  • Legal Risks: Paying the ransom could violate financial sanctions, risking criminal charges, fines, or imprisonment. 
  • Data Exposure: If your data is leaked or sold, it puts your customers and employees at risk, violating data protection laws. 
  • Data Removal: Ensure you request the removal of your data from its original location immediately. 
  • Data Preservation: Do not overwrite any encrypted data. It is essential to identify the infection's origin and trace the data exfiltration. 
  • Backup Caution: Avoid restoring from the latest backup as it may also contain the infection. 
How to Safeguard Your Business from Future Ransomware Attacks

At Solace Cyber, our services extend beyond recovery. Once your operations are restored, we collaborate with you to reinforce your cybersecurity. With a threat-informed strategy, we implement a robust framework to fortify your security and better protect against future attacks. 

Frequently asked questions

Medusa ransomware is a type of ransomware that operates through the Ransomware-as-a-Service (RaaS) model, working alongside global affiliates to maximise its reach and impact. 

There are several potential entry points for Medusa ransomware into your system, including: 

  • Phishing attacks 
  • Exploiting system vulnerabilities 
  • Using purchased credentials 

To prevent such attacks, we recommend implementing the following measures: 

  • Educating employees on cybersecurity best practices 
  • Enforcing strong password policies 
  • Enabling multi-factor authentication 
  • Removing inactive users 
  • Performing regular system backups 
  • Keeping software and systems up to date 

Following recovery from Medusa, Solace Cyber advises updating your business continuity plan to reflect any insights gained during the attack and recovery process. 

The average cost of a ransomware attack is approximately £500K, while smaller email data breaches typically result in losses around £50K. The longer it takes to identify and resolve a breach, the higher the costs, making it critical to balance forensic analysis with quick recovery efforts to minimise disruption. 

Cybersecurity insurance claims are complex, covering investigation, remediation, legal fees, business interruption, criminal and employment liability, as well as ransom payments. While insurers play a role in facilitating recovery, the cyber insurance market is unpredictable, and many policies are inadequately validated. 

Navigating through these complexities requires expertise, and Solace Cyber is here to provide support. 

Criminal groups like Medusa profit by hiring affiliates to carry out cyberattacks using their proprietary malware, which is known for its fast and effective encryption. Even after paying the ransom, the likelihood of successfully decrypting files and restoring data is slim, highlighting the need for a dedicated ransomware incident response team. 

Important Reminder: Paying ransoms to individuals subject to financial sanctions is a criminal offence. The list of those under sanctions is constantly updated. 

Yes, as it is possible that some of the lost data may include "Personal Data" belonging to your customers. As the data controller, you are legally obligated to protect this information, even if it has been compromised. 

Your insurer or legal advisor will guide you on the necessary steps to take. Solace Cyber works closely with insurers and legal professionals and can assist in managing this process during this challenging time. 

Ransomware attacks pose the greatest risk to your business by: 

  • Disrupting access to essential systems, potentially halting machinery operations or obstructing key business processes. 
  • Blocking access to critical data, such as supplier information, customer orders, shipments, or workflow data. 

In cases of business disruption, determining your position in the supply chain and maintaining operations can become difficult. If the disruption continues, ensuring business continuity becomes crucial. Once systems and data are restored, addressing the backlog of work and setting operational procedures for the future is necessary. 

Ransomware is second only to receivership in its potential to incapacitate a business. 

Under Australian law, organisations experiencing ransomware attacks must report incidents to both the Australian Signals Directorate (ASD) and the Office of the Australian Information Commissioner (OAIC), particularly when personal information is compromised, ensuring regulatory compliance and coordinated national response. 

Contact Us

Suspect a Ransomware Incident?

Keep calm and step away from your systems. 

Avoid restoring files or altering data in any way, as doing so may complicate recovery efforts. 

Reach out to Solace Cyber now on +61 (0) 282 786100 or submit our contact form to have an expert return your call. 

We’ll take swift action to minimise downtime and restore stability to your operations. 

 

GDPR*
Request a callback

Solace Cyber helps companies across Australia recover from ransomware attacks and data breaches.

Ransomware Recovery
Ransomware Groups
BEC Recovery
About Us
Blog
News

SOLACE CYBER LTD is registered in England & Wales no. 08830710

Incident Response Winner 2025

Solace Cyber

Zensec Ltd,
60 Martin Place,
Sydney,
NSW 2000

Telephone

Please note that calls may be recorded for security and training purposes.