This week we briefed our clients on a #StopRansomware advisory on Medusa and campaigns we've seen from ClickFix and Fake Captcha.
KEY TAKEAWAYS
New #StopRansomware advisory from CISA and FBI for Medusa RaaS. Learn the group’s TTPs so you can protect your organization.
ClickFix and FakeCaptcha attacks are here to stay for 2025.
Critical vulnerabilities in Veeam, Fortinet, and Apache Tomcat. Patch now!
This month, CISA and the FBI released a joint #StopRansomware advisory for Medusa, a double extortion ransomware-as-a-service (RaaS) group first identified in June 2021. In recent months, the group has been gaining momentum, impacting over 300 organizations across a variety of industry verticals including medical, education, legal, insurance, technology, and manufacturing. This Medusa ransomware variant should not be confused with MedusaLocker or the Medusa mobile malware variant.
Initial Access
Medusa has been observed using both phishing and remote exploitation to gain initial access. With the phishing attacks, they are used simply to gain the victim's credentials for remote access. When the group uses remote exploitation, they have been observed leveraging known vulnerabilities such as CVE-2024-1709 (authentication bypass in ScreenConnect) and CVE-2023-48788 (Fortinet EMS SQL Injection).
Network Discovery
Once Medusa has a foothold in the target environment, they use living-off-the-land (LOTL) and other legitimate tools such as Advanced IP Scanner and SoftPerfect Network scanner for enumeration. Medusa tends to restrict their scans to common ports and services, such as 21/FTP, 22/SSH, 23/Telnet, 80/HTTP, 115/SFTP, 443/HTTPS, 1433/SQL, 3050/Firebird, 3128/HTTP proxy, 3306/MySQL, and 3389/RDP.
Defense Evasion
The group heavily relies on LOTL techniques to avoid detection. They use Certutil (certutil.exe) to download additional files and payloads. Medusa also heavily uses Base64-encoded PowerShell commands, and then deletes the PowerShell command line history. For command and control (C2), they use off the shelf tools to hide their activity such as Ligolo and Cloudflared.
Lateral Movement
Medusa uses a versatile range of remote access tools for lateral movement, shifting tools depending on what is available in the target network. They have been observed abusing AnyDesk, Atera, ConnectWise, eHorus, N-able, PDQ Deploy, PDQ Inventory, SimpleHelp, and Splashtop, as well as traditional RDP. The group will go so far as to run a batch script enabling RDP access on the local firewall. To harvest credentials for further privilege escalation and lateral movement, Medusa has been observed using Mimikatz for LSASS dumping.
Data Exfiltration and Encryption
Medusa typically uses Rclone to exfiltrate data to their C2 servers. In order to deploy their encryptor, gaze.exe, across the network, Medusa leverages LOTL tools such as PsExec, PDQ Deploy, or BigFix. The group will attempt to disable Windows Defender and other AV tools in the environment before the encryptor is detonated.
How to Protect Your Organization
Protecting your organization from threats like Medusa are similar to other ransomware threats:
Resources:
Over the past 3 months, PacketWatch Threat Intelligence has documented ClickFix and Fake Captcha campaigns on 3 separate occasions [1][2][3]. Both attacks involve tricking the user into opening a command terminal and then pasting and executing malicious code copied over from the clipboard. With ClickFix, this site will give a fake error message, stating that to fix the problem the user needs to run the malicious command. With Fake Captcha, the user is presented with what looks like a "verify you are human" captcha portal, where they are instructed to run the malicious command to prove they are human. These tactics are becoming increasingly widespread and are being leveraged to deploy infostealer malware to large numbers of victims.
Just in the last 2 weeks, there have been several new campaigns reported:
Having network monitoring and detection such as PacketWatch endpoint detection tools across all endpoints can detect and block these intrusions. However, the most important tool in combating these types of social engineering attacks is user awareness training. ClickFix and Fake Captcha attacks are here to stay for 2025 and beyond, and all users should be made aware of what the attacks look like so they can avoid running the commands. Administrators can also take an additional step by disabling PowerShell and the Command Prompt via GPO.
Resources:
https://packetwatch.com/resources/threat-intel/cyber-threat-intelligence-12-30-2024
https://packetwatch.com/resources/threat-intel/cyber-threat-intelligence-01-13-2025
https://packetwatch.com/resources/threat-intel/cyber-threat-intelligence-03-10-2025
https://www.microsoft.com/en-us/security/blog/2025/03/13/phishing-campaign-impersonates-booking-com-delivers-a-suite-of-credential-stealing-malware/
https://blog.sekoia.io/clearfakes-new-widespread-variant-increased-web3-exploitation-for-malware-delivery/
https://rmceoin.github.io/malware-analysis/2025/03/13/supply-chain.html
https://malpedia.caad.fkie.fraunhofer.de/details/win.sectop_rat
https://thehackernews.com/2025/03/clearfake-infects-9300-sites-uses-fake.html
Vulnerability Roundup
On March 19, Veeam published a security advisory for a new critical remote code execution (RCE) vulnerability, tracked as CVE-2025-23120, that affects Backup & Replication systems that are domain joined. Per the advisory, all supported versions of Backup & Replication are affected. While no proof-of-concept code has yet to be observed in the wild, administrators are urged to upgrade to version 12.3.1 (build 12.3.1.1139) or higher as soon as possible.
Last week, CISA added CVE-2025-24472 to their Known Exploited Vulnerabilities (KEV) catalog. This vulnerability, along with CVE-2024-55591, are a pair of critical authentication bypass vulnerabilities disclosed earlier this year that are often abused together to gain super-admin privileges on affected FortiOS and FortiProxy versions.
Administrators are urged to apply updates as soon as possible if they have not been done so already. Additionally, it is highly recommended to disable management interface access to the open internet and restrict access only to trusted IP addresses.
https://www.cisa.gov/known-exploited-vulnerabilities-catalog
https://www.darkreading.com/cyberattacks-data-breaches/critical-fortinet-vulnerability-draws-fresh-attention
https://packetwatch.com/resources/threat-intel/cyber-threat-intelligence-01-27-2025
A critical remote code execution flaw in Apache Tomcat was disclosed on March 10, 2025. Tracked as CVE-2025-24813, the vulnerability allows an unauthenticated remote attacker to view or modify content of files on the server. Affected versions are Apache Tomcat 11.0.0-M1 to 11.0.2, 10.1.0-M1 to 10.1.34, and 9.0.0.M1 to 9.0.98. For the exploit to work, the following conditions must be met:
Proof-of-concept code is in the wild, and the vulnerability is being actively exploited. Administrators are urged to apply updates as soon as possible. This vulnerability may also be mitigated by reverting to the default servlet configuration readonly="true", by turning off partial PUT support, and avoid storing security-sensitive files in a subdirectory of public upload paths.
https://lists.apache.org/thread/j5fkjv2k477os90nczf2v9l61fb0kkgq
https://lab.wallarm.com/one-put-request-to-own-tomcat-cve-2025-24813-rce-is-in-the-wild/
https://thehackernews.com/2025/03/apache-tomcat-vulnerability-comes-under.html
https://www.bleepingcomputer.com/news/security/critical-rce-flaw-in-apache-tomcat-actively-exploited-in-attacks/
https://github.com/iSee857/CVE-2025-24813-PoC/blob/main/Tomcat_CVE-2025-24813_RCE.py
This report is provided FREE to the cybersecurity community.
Visit our Cyber Threat Intelligence Blog for additional reports.
Subscribe to be notified of future Reports:
NOTE
We have enhanced our report with data from SOCRadar. You may need to register to view their threat intelligence content.
DISCLAIMER
Kindly be advised that the information contained in this article is presented with no final evaluation and should be considered raw data. The sole purpose of this information is to provide situational awareness based on the currently available knowledge. We recommend exercising caution and conducting further research as necessary before making any decisions based on this information.