Medusa Group

MITRE
Type:
Unknown
Country:
Unknown
First seen:
Unknown
Details:

[Medusa Group](https://attack.mitre.org/groups/G1051) has been active since at least 2021 and was initially operated as a closed ransomware group before evolving into a Ransomware-as-a-Service (RaaS) operation. Some reporting indicates that certain attacks may still be conducted directly by the ransomware’s core developers. Public sources have also referred to the group as “Spearwing” or “Medusa Actors.” (Citation: CISA Medusa Group Medusa Ransomware March 2025) (Citation: Broadcom Medusa Ransomware Medusa Group March 2025) [Medusa Group](https://attack.mitre.org/groups/G1051) employs living-off-the-land techniques, frequently leveraging publicly available tools and common remote management software to conduct operations. The group engages in double extortion tactics, exfiltrating data prior to encryption and threatening to publish stolen information if ransom demands are not met. (Citation: Security Scorecard Medusa Ransomware January 2024) For initial access, [Medusa Group](https://attack.mitre.org/groups/G1051) has exploited publicly known vulnerabilities, conducted phishing campaigns, and used credentials or access purchased from Initial Access Brokers (IABs). The group is opportunistic and has targeted a wide range of sectors globally. (Citation: Intel471 Medusa Ransomware May 2025)

MITRE ATT&CK: View on MITRE
Techniques Used (57)
ID ATT&CK Tactics
T1003.001 LSASS Memory -
T1003.003 NTDS -
T1016 System Network Configuration Discovery -
T1018 Remote System Discovery -
T1021.001 Remote Desktop Protocol -
T1027.002 Software Packing -
T1027.010 Command Obfuscation -
T1033 System Owner/User Discovery -
T1046 Network Service Discovery -
T1047 Windows Management Instrumentation -
T1057 Process Discovery -
T1059.001 PowerShell -
T1059.003 Windows Command Shell -
T1069.002 Domain Groups -
T1070.003 Clear Command History -
Metadata
ID: 866
Created: 13/01/2026 17:48
Updated: 21/04/2026 16:00