zerofox logo
Advisories

ZeroFox Intelligence Flash Report - North Korean Threat Actor Revealed as Medusa Affiliate

|by Alpha Team

banner image

ZeroFox Intelligence Flash Report - North Korean Threat Actor Revealed as Medusa Affiliate

Product Serial: F-2026-02-27a

TLP:CLEAR

In this Flash report, ZeroFox researchers report on North Korean state-sponsored threat actor Lazarus Group deploying Medusa ransomware in an effort to conceal financially motivated operations behind an established ransomware brand.

Standing Intelligence Requirements

For the most up-to-date list of ZeroFox’s Intelligence Requirements, please visit:

https://cloud.zerofox.com/intelligence/advisories/14956

Link to Download

View the full report here

Key Findings

  • On February 24, 2026, North Korean threat actor “Lazarus Group” reportedly widely deployed Medusa ransomware in a series of attempted attacks against healthcare organizations. These attacks indicate that state-sponsored threat actors are almost certainly using cybercrime infrastructure to generate revenue for the North Korean government.
  • By combining with Medusa, Lazarus Group has likely gained access to an established ransomware infrastructure with which to conduct financially motivated attacks. However, Medusa is an independent threat actor, and not all Medusa ransomware-as-as-service (RaaS) attacks should be attributed to Lazarus Group.
  • Lazarus Group’s deployment of Medusa RaaS likely indicates the collective is seeking to improve the operational security of its financially motivated attacks by concealing its activities behind the established brand of the Medusa RaaS operation.
  • Given the group’s history of conducting state-sponsored attacks that advance North Korean government objectives, it is very likely their financially motivated operations are intended to generate revenue for the communist regime in Pyongyang.

Tags: tlp:clear geo-political malware