If you ever feel the need for a boost of self-confidence, try our exclusive Medusa Soap bar. Use it before a ritual or meditation to awaken your feminine strength and help channel that energy into your work, art, or daily life.

https://www.inkedgoddesscreations.com/products/medusa-soap
#Medusa

New post from #Medusa : Northeast Missouri Rural Telephone
More at : https://www.ransomlook.io/group/Medusa #Ransomware
medusa details

Open, searchable ransomware group intelligence with live stats, posts and an API.

Cisco Talos recently published an analysis of an EDR killer used by the #Qilin #ransomware gang. #ESETresearch tracks this threat as #CardSpaceKiller and we recently provided additional insights in our blog https://www.welivesecurity.com/en/eset-research/edr-killers-explained-beyond-the-drivers/
While we didn’t obtain direct evidence, we strongly believe that CardSpaceKiller is offered as a product on the darknet for reasons covered in the blog. We’ve detected it used by #Akira, #Medusa, and #MedusaLocker affiliates too.
The packer (identified as VX Crypt by Sophos) is not unique to this killer; it’s a PaaS used with other malware like #BumbleBee. But it is the single choice for the killer’s developer; unprotected samples were used only in 2025-02 https://www.sophos.com/en-us/blog/inside-shanya-a-packer-as-a-service-fueling-modern-attacks/
Beyond msimg32.dll mentioned in the Talos‘ blog, VX Crypt also names the payloads rtworkq.dll and version.dll, all abusing DLL side-loading for evasion. We’ve also observed an EXE variant in the wild, named 0th3r_av5.exe https://blog.talosintelligence.com/qilin-edr-killer/
Additional IoCs: 127B50C8185986A52AE66BF6E7E67A6FD787C4FC (version.dll)

22640D48F2E2A56C7A0708356B2B6990676B58B3 (version.dll)

3030DF03F36EC4C96B36B2E328FE3D7D9082811A (0th3r_av5.exe)

52D0358FF84295D231BC180CEDFDAF96631D67B4 (rtworkq.dll)
5D3CF785A440133A899412B800742716287D0B06 (msimg32.dll)

A3BDB419703A70157F2B7BD1DC2E4C9227DD9FE8 (0th3r_av5.exe)

Storm-1175 is hitting orgs with chained zero-days and dropping Medusa ransomware in under 24 hours.

Full write-up: https://forum.hashpwn.net/post/12014

#cybersecurity #storm1175 #zeroday #medusa #ransomeware #windows #news #hashpwn

Storm-1175 : campagnes Medusa ransomware à haute cadence ciblant les actifs web exposés

🧭 Contexte Source : Microsoft Security Blog — Publication du 6 avril 2026. Analyse de menace produite par Microsoft Threat Intelligence portant sur l’acteur Storm-1175, un groupe cybercriminel à motivation financière opérant des campagnes ransomware Medusa à haute cadence. 🎯 Profil de l’acteur Storm-1175 est un acteur cybercriminel financièrement motivé, caractérisé par un tempo opérationnel élevé et une forte capacité à identifier des actifs périmètre exposés. Il exploite la fenêtre temporelle entre la divulgation publique d’une vulnérabilité et l’adoption généralisée des correctifs.

CyberVeille

💥BATTLE DER GIGANTEN💥

Zwei Figuren aus der griechischen Mythologie treten gegeneinander an und ihr entscheidet wer gewinnt!
Wer ist stärker? Und wieso? Wer hat die fieseren Tricks?

Heute:
🕶️Geblendeter vs Todesblick👁️

...3...2...1...FIGHT!💥

#daschaosundseinekinder #battledergiganten #olympia #olympischespiele #ödipus #Medusa #schlangen #blind #kampf #wergewinnt #griechischemythologie #chaos #antike

📢 Storm-1175 hackers are launching high-speed Medusa ransomware attacks against healthcare and education sectors in the UK, US, and Australia by exploiting security flaws in as little as 24 hours.

Read: https://hackread.com/storm-1175-hackers-24-hour-medusa-ransomware-flaw/

#CyberSecurity #Vulnerability #Storm1175 #Medusa #Ransomware

Storm-1175 Deploys Medusa Ransomware Within 24 Hours of Vulnerability Disclosure

Storm-1175 launches Medusa ransomware attacks on healthcare and education in the UK, US, and Australia, exploiting flaws within 24 hours fast.

Hackread - Cybersecurity News, Data Breaches, AI and More
Microsoft links Medusa ransomware affiliate to zero-day attacks

Microsoft says that Storm-1175, a China-based financially motivated cybercriminal group known for deploying Medusa ransomware payloads, has been deploying n-day and zero-day exploits in high-velocity attacks.

BleepingComputer