Cybersecurity analysts monitoring Lazarus Group ransomware campaign on multiple screens
HighCyber Attacks

Lazarus Group 2026: North Korea Deploys Medusa Ransomware and Backdoors in Global Cyberattacks

In 2026, North Korea's Lazarus Group expanded its arsenal by integrating Medusa ransomware, the Blindingcan RAT, and Comebacker backdoor in global cyberattack campaigns targeting finance, defense, and critical infrastructure worldwide. Security researchers from Dark Reading confirm this major tactical evolution.

Emanuel DE ALMEIDA 24 Feb 2026, 22:18 2 min read 0 views 0 Comments

Last updated 11 Mar 2026, 02:33

Key Takeaways

Lazarus Group Adopts Medusa Ransomware Toolkit

The North Korean state-sponsored Lazarus Group has shifted tactics by incorporating Medusa ransomware into its attack arsenal. Security researchers identified the group deploying this new ransomware variant alongside established malware tools in recent campaigns targeting organizations globally.

The threat group's latest operations demonstrate a multi-stage approach combining ransomware deployment with data theft capabilities. Dark Reading reports that this represents a significant evolution in the group's tactics, techniques, and procedures.

Global Organizations Under Active Threat

The campaign targets organizations across multiple sectors worldwide. Lazarus Group's adoption of Medusa ransomware expands their ability to conduct financially motivated attacks while maintaining their traditional espionage objectives.

The group's sophisticated toolchain allows them to adapt their approach based on target value and defensive posture. Organizations with valuable intellectual property or financial assets face heightened risk from these combined ransomware and data theft operations.

Multi-Tool Attack Chain Identified

Lazarus Group deploys Medusa ransomware alongside three additional malware families. The Comebacker backdoor provides persistent access to compromised networks, while Blindingcan RAT enables remote command execution and system control.

The Infohook information stealer completes the toolkit by harvesting sensitive data before ransomware deployment. This combination allows the group to maximize financial gain through both data extortion and encryption-based ransom demands. Security teams should monitor for indicators of compromise associated with these four malware families operating in conjunction.

Frequently Asked Questions

What is Lazarus Group's new ransomware?
Lazarus Group now uses Medusa ransomware alongside Comebacker backdoor, Blindingcan RAT, and Infohook stealer in coordinated attacks.
Who is behind the Medusa ransomware attacks?
The North Korean state-sponsored threat group Lazarus Group is deploying Medusa ransomware in recent global campaigns.
What tools does Lazarus Group use with Medusa?
The group combines Medusa ransomware with Comebacker backdoor for persistence, Blindingcan RAT for control, and Infohook for data theft.

About the Author

Emanuel DE ALMEIDA

Emanuel DE ALMEIDA

Senior IT Journalist & Cloud Architect

Microsoft MCSA-certified Cloud Architect | Fortinet-focused. I modernize cloud, hybrid & on-prem infrastructure for reliability, security, performance and cost control - sharing field-tested ops & troubleshooting.

Discussion

Share your thoughts and insights

You must be logged in to comment.

Loading comments...