RSS feed source: US Computer Emergency Readiness Team

Summary

Note: This joint Cybersecurity Advisory is part of an ongoing #StopRansomware effort to publish advisories for network defenders detailing various ransomware variants and ransomware threat actors. These #StopRansomware advisories include recently and historically observed tactics, techniques, and procedures (TTPs) and indicators of compromise (IOCs) to help organizations protect against ransomware. Visit stopransomware.gov to see all #StopRansomware advisories and to learn more about other ransomware threats and no-cost resources.

The Federal Bureau of Investigation (FBI), Cybersecurity and Infrastructure Security Agency (CISA), and the Multi-State Information Sharing and Analysis Center (MS-ISAC) are releasing this joint advisory to disseminate known Medusa ransomware TTPs and IOCs, identified through FBI investigations as recently as February 2025. 

Medusa is a ransomware-as-a-service (RaaS) variant first identified in June 2021. As of February 2025, Medusa developers and affiliates have impacted over 300 victims from a variety of critical infrastructure sectors with affected industries including medical, education, legal, insurance, technology, and manufacturing. The Medusa ransomware variant is unrelated to the MedusaLocker variant and the Medusa mobile malware variant per the FBI’s investigation.

FBI, CISA, and MS-ISAC encourage organizations to implement the recommendations in the Mitigations section of this advisory to reduce the likelihood and impact of Medusa ransomware incidents.

Download the PDF version of this report:

For a downloadable list of IOCs, see:

AA25-071A STIX XML (XML, 34.30 KB )

Click this link to continue reading the article on the source website.

RSS feed source: US Computer Emergency Readiness Team

“Air Power alone does not guarantee America’s security, but I believe it best exploits the nation’s greatest asset – our technical skill” -Gen. Hoyt Vandenberg Military aviation allows the United States to unambiguously project power globally, with

Click this link to continue reading the article on the source website.

RSS feed source: US Computer Emergency Readiness Team

Summary

Note: This joint Cybersecurity Advisory is part of an ongoing #StopRansomware effort to publish advisories for network defenders that detail various ransomware variants and ransomware threat actors. These #StopRansomware advisories include recently and historically observed tactics, techniques, and procedures (TTPs) and indicators of compromise (IOCs) to help organizations protect against ransomware. Visit stopransomware.gov to see all #StopRansomware advisories and to learn more about other ransomware threats and no-cost resources.

The Federal Bureau of Investigation (FBI), Cybersecurity and Infrastructure Security Agency (CISA), and the Multi-State Information Sharing and Analysis Center (MS-ISAC) are releasing this joint advisory to disseminate known Ghost (Cring)—(“Ghost”)—ransomware IOCs and TTPs identified through FBI investigation as recently as January 2025.

Beginning early 2021, Ghost actors began attacking victims whose internet facing services ran outdated versions of software and firmware. This indiscriminate targeting of networks containing vulnerabilities has led to the compromise of organizations across more than 70 countries, including organizations in China. Ghost actors, located in China, conduct these widespread attacks for financial gain. Affected victims include critical infrastructure, schools and universities, healthcare, government networks, religious institutions, technology and manufacturing companies, and numerous small- and medium-sized businesses.

Ghost actors rotate their ransomware executable payloads, switch file extensions for encrypted files, modify ransom note text, and use numerous ransom email addresses, which has led to variable attribution of this group over

Click this link to continue reading the article on the source website.

RSS feed source: US Computer Emergency Readiness Team

Published by CBS News March 20,2018

MIAMI — Construction of the pedestrian bridge that collapsed and killed six people in the Miami area was behind schedule and millions over budget, in part because of a key change in the design and placement of one of its support towers. Documents obtained by The Associated Press through a public-records request show that the Florida Department of Transportation in October 2016 ordered Florida International University (FIU) and its contractors to move one of the bridge’s main support structures 11 feet north to the edge of a canal, widening the gap between the crossing’s end supports and requiring some new structural design.

Engineer flagged “cracking” in Miami bridge 2 days before deadly collapse

The span’s signature, 109-foot-tall pylon was to be built atop a footing, or base, at the northern end of the span. In addition to basic support, its design was also aimed at contributing to the aesthetics of the bridge, which itself was touted as an architectural marvel that would span a busy road and canal to connect the rapidly growing university to the nearby community of Sweetwater. In their winning 2015 proposal, designers said the bridge provided “spectacular views” for both pedestrians using the bridge and drivers passing beneath it. And they added that the tower could serve as a safety feature because it provided an “eagle-eyed location” for additional lighting and security cameras.

Continue reading the full article…

Click this link to continue reading the article on the source website.