6 min read

Cyber Threat Intelligence Report

Cyber Threat Intelligence Report

This week we briefed our clients on a #StopRansomware advisory on Medusa and campaigns we've seen from ClickFix and Fake Captcha.

 

 KEY TAKEAWAYS 

  • New #StopRansomware advisory from CISA and FBI for Medusa RaaS. Learn the group’s TTPs so you can protect your organization.

  • ClickFix and FakeCaptcha attacks are here to stay for 2025.

  • Critical vulnerabilities in Veeam, Fortinet, and Apache Tomcat. Patch now!




 

Medusa Ransomware TTPs

This month, CISA and the FBI released a joint #StopRansomware advisory for Medusa, a double extortion ransomware-as-a-service (RaaS) group first identified in June 2021. In recent months, the group has been gaining momentum, impacting over 300 organizations across a variety of industry verticals including medical, education, legal, insurance, technology, and manufacturing. This Medusa ransomware variant should not be confused with MedusaLocker or the Medusa mobile malware variant.

 

Initial Access

Medusa has been observed using both phishing and remote exploitation to gain initial access. With the phishing attacks, they are used simply to gain the victim's credentials for remote access. When the group uses remote exploitation, they have been observed leveraging known vulnerabilities such as CVE-2024-1709 (authentication bypass in ScreenConnect) and CVE-2023-48788 (Fortinet EMS SQL Injection).

 

Network Discovery

Once Medusa has a foothold in the target environment, they use living-off-the-land (LOTL) and other legitimate tools such as Advanced IP Scanner and SoftPerfect Network scanner for enumeration. Medusa tends to restrict their scans to common ports and services, such as 21/FTP, 22/SSH, 23/Telnet, 80/HTTP, 115/SFTP, 443/HTTPS, 1433/SQL, 3050/Firebird, 3128/HTTP proxy, 3306/MySQL, and 3389/RDP.

 

Defense Evasion

The group heavily relies on LOTL techniques to avoid detection. They use Certutil (certutil.exe) to download additional files and payloads. Medusa also heavily uses Base64-encoded PowerShell commands, and then deletes the PowerShell command line history. For command and control (C2), they use off the shelf tools to hide their activity such as Ligolo and Cloudflared.

 

Lateral Movement

Medusa uses a versatile range of remote access tools for lateral movement, shifting tools depending on what is available in the target network. They have been observed abusing AnyDesk, Atera, ConnectWise, eHorus, N-able, PDQ Deploy, PDQ Inventory, SimpleHelp, and Splashtop, as well as traditional RDP. The group will go so far as to run a batch script enabling RDP access on the local firewall. To harvest credentials for further privilege escalation and lateral movement, Medusa has been observed using Mimikatz for LSASS dumping.

 

Data Exfiltration and Encryption

Medusa typically uses Rclone to exfiltrate data to their C2 servers. In order to deploy their encryptor, gaze.exe, across the network, Medusa leverages LOTL tools such as PsExec, PDQ Deploy, or BigFix. The group will attempt to disable Windows Defender and other AV tools in the environment before the encryptor is detonated.

 

How to Protect Your Organization

Protecting your organization from threats like Medusa are similar to other ransomware threats:

  • Use strong passwords in combination with multi-factor authentication (MFA).
  • Keep operating systems and software up to date. Actively applying patches in a timely manner, especially to internet-facing assets, is crucial for preventing initial access.
  • Have fully up to date EDR tools deployed across all possible endpoints.
  • Use network monitoring tools such as PacketWatch to detect anomalous network traffic.
  • Implement robust network segmentation.
  • Disable unused ports and services.
  • Limit which accounts have administrative privileges (principle of least privilege).
  • Document and baseline usage of approved software to make LOTL and anomalous behavior easier to identify.
  • Maintain offline backups of data and regularly test and maintain these backups.

 

Resources:

 

NPSA: ClickFix & Fake Captcha are Here to Stay

Over the past 3 months, PacketWatch Threat Intelligence has documented ClickFix and Fake Captcha campaigns on 3 separate occasions [1][2][3]. Both attacks involve tricking the user into opening a command terminal and then pasting and executing malicious code copied over from the clipboard. With ClickFix, this site will give a fake error message, stating that to fix the problem the user needs to run the malicious command. With Fake Captcha, the user is presented with what looks like a "verify you are human" captcha portal, where they are instructed to run the malicious command to prove they are human. These tactics are becoming increasingly widespread and are being leveraged to deploy infostealer malware to large numbers of victims.

Just in the last 2 weeks, there have been several new campaigns reported:

  • A large set of WordPress sites were compromised to deliver Lumma Stealer.
  • A phishing campaign attributed to Storm-1865 where emails impersonating booking[.]com were using ClickFix to push infostealers and remote access trojans.
  • Over 100 auto dealership websites were compromised to display ClickFix errors, leading to the delivery of SectopRAT. PacketWatch directly observed this campaign and can confirm that MDR customers are protected from this infection chain.

Having network monitoring and detection such as PacketWatch endpoint detection tools across all endpoints can detect and block these intrusions. However, the most important tool in combating these types of social engineering attacks is user awareness training. ClickFix and Fake Captcha attacks are here to stay for 2025 and beyond, and all users should be made aware of what the attacks look like so they can avoid running the commands. Administrators can also take an additional step by disabling PowerShell and the Command Prompt via GPO.


 

Resources:

 

 

Vulnerability Roundup

 

Critical RCE in Veeam Backup & Replication

On March 19, Veeam published a security advisory for a new critical remote code execution (RCE) vulnerability, tracked as CVE-2025-23120, that affects Backup & Replication systems that are domain joined. Per the advisory, all supported versions of Backup & Replication are affected. While no proof-of-concept code has yet to be observed in the wild, administrators are urged to upgrade to version 12.3.1 (build 12.3.1.1139) or higher as soon as possible.

 


Fortinet Vulnerability Under Active Exploitation

Last week, CISA added CVE-2025-24472 to their Known Exploited Vulnerabilities (KEV) catalog. This vulnerability, along with CVE-2024-55591, are a pair of critical authentication bypass vulnerabilities disclosed earlier this year that are often abused together to gain super-admin privileges on affected FortiOS and FortiProxy versions.

  • FortiOS 7.0.0 through 7.0.16 (Upgrade to 7.0.17 or above)
  • FortiProxy 7.2.0 through 7.2.12 (Upgrade to 7.2.13 or above)
  • FortiProxy 7.0.0 through 7.0.19 (Upgrade to 7.0.20 or above)

Administrators are urged to apply updates as soon as possible if they have not been done so already. Additionally, it is highly recommended to disable management interface access to the open internet and restrict access only to trusted IP addresses.

 

Apache Tomcat RCE Under Active Exploitation

A critical remote code execution flaw in Apache Tomcat was disclosed on March 10, 2025. Tracked as CVE-2025-24813, the vulnerability allows an unauthenticated remote attacker to view or modify content of files on the server. Affected versions are Apache Tomcat 11.0.0-M1 to 11.0.2, 10.1.0-M1 to 10.1.34, and 9.0.0.M1 to 9.0.98. For the exploit to work, the following conditions must be met:

  • Writes enabled for the default servlet (readonly= "false") — (Disabled by default)
  • Support for partial PUT is enabled (Enabled by default.)
  • Security-sensitive uploads occur in a sub-directory of a public upload directory.
  • The attacker knows the names of security-sensitive files being uploaded.
  • These security-sensitive files are being uploaded using partial PUT.

Proof-of-concept code is in the wild, and the vulnerability is being actively exploited. Administrators are urged to apply updates as soon as possible. This vulnerability may also be mitigated by reverting to the default servlet configuration readonly="true", by turning off partial PUT support, and avoid storing security-sensitive files in a subdirectory of public upload paths.

 


 

This report is provided FREE to the cybersecurity community.

Visit our Cyber Threat Intelligence Blog for additional reports.

 


Subscribe to be notified of future Reports:


NOTE
We have enhanced our report with data from SOCRadar. You may need to register to view their threat intelligence content.

DISCLAIMER
Kindly be advised that the information contained in this article is presented with no final evaluation and should be considered raw data. The sole purpose of this information is to provide situational awareness based on the currently available knowledge. We recommend exercising caution and conducting further research as necessary before making any decisions based on this information.