Microsoft has revealed that the Medusa ransomware group is increasingly exploiting software vulnerabilities even before they are publicly disclosed, highlighting a growing and concerning shift in cyberattack tactics. In a recent analysis, Microsoft researchers detailed how the group has demonstrated a high level of speed and efficiency, often moving from initial system access to data exfiltration and ransomware deployment within just 24 hours. The attackers are also known to aggressively target internet-facing systems during the critical window between vulnerability discovery and patch deployment.
The Medusa operation has been linked to several high-profile incidents, including attacks on a major hospital in Mississippi and a county government in New Jersey. According to Microsoft, the group’s ability to quickly identify exposed systems and exploit weaknesses has led to significant disruption across sectors such as healthcare, education, finance, and professional services in regions including the United States, United Kingdom, and Australia.
Although some attacks are executed within a single day, many incidents extend over several days, typically lasting between five and six days. During this time, attackers establish persistence by creating new user accounts and leveraging legitimate remote management tools such as ConnectWise ScreenConnect, AnyDesk, and SimpleHelp to maintain access and avoid detection.
Microsoft highlighted specific vulnerabilities CVE-2026-23760 in SmarterMail and CVE-2025-10035 in GoAnywhere Managed File Transfer as examples of flaws exploited by Medusa actors before they were publicly disclosed. The Cybersecurity and Infrastructure Security Agency (CISA) has also confirmed that these vulnerabilities have been used in ransomware campaigns.
This trend reflects a broader shift in the threat landscape, where attackers are rapidly weaponizing newly discovered vulnerabilities, leaving organizations with little time to respond. Security experts believe the Medusa group is likely based in Russia, citing indicators such as its avoidance of targets in Commonwealth of Independent States (CIS) countries, use of Russian-language forums, and deployment of Cyrillic-based tools.
Emerging in 2021, the group has consistently targeted high-impact sectors, particularly healthcare institutions and local government entities. Recent claims of responsibility include attacks on Passaic County in New Jersey and the University of Mississippi Medical Center, which required federal assistance to restore operations. In a related development, researchers at Symantec reported that members of the North Korean-linked Lazarus Group have also been observed deploying Medusa ransomware, suggesting potential overlap or collaboration among advanced threat actors.
Microsoft emphasized that organizations must adopt a more proactive approach to cybersecurity, including gaining better visibility into their external attack surface and prioritizing rapid patching of vulnerabilities.As ransomware groups like Medusa continue to accelerate their operations and exploit weaknesses earlier in the vulnerability lifecycle, the window for defense is shrinking making preparedness and rapid response more critical than ever.
Recommended Cyber Technology News :
- ClickFix Malware Abuses Windows Tools to Avoid Detection
- Resultant Acquires Liberty Advisor Group to Strengthen M&A Capabilities
- ExpressVPN Launches ExpressAI Private AI Platform
To participate in our interviews, please write to our CyberTech Media Room at info@intentamplify.com
🔒 Login or Register to continue reading




