![powershell crypto locker powershell crypto locker](https://www.pcrisk.com/images/stories/screenshots201705/blackout-homepage.jpg)
Threat actors exploit vulnerable RDP services in the victim network to gain initial access.
![powershell crypto locker powershell crypto locker](https://www.frankysweb.de/wp-content/uploads/2016/02/image-18.png)
Although MedusaLocker threatens its victims to release stolen sensitive data, there is no evidence of data exfiltration. MedusaLocker ransomware is typical ransomware that uses the single extortion model, meaning that the ransomware encrypts its victim's data and demands ransom for the decryption key.
POWERSHELL CRYPTO LOCKER TRIAL
Simulate Ransomware Threats with 14-Day Free Trial of Picus Platform MedusaLocker Ransomware Although Picus Labs added attack simulations for MedusaLocker ransomware to Picus Threat Library back in October 2021, the recent MedusaLocker ransomware attacks led us to write this blog post. MedusaLocker operates a Ransomware-as-a-Service and has been known to target multiple organizations, especially healthcare and pharmaceutical companies. On June 30, 2022, The Cybersecurity and Infrastructure Security Agency (CISA) released a joint advisory on MedusaLocker ransomware.