We're gradually updating threat actor names in our reports to align with the new weather-themed taxonomy. Learn about Microsoft threat actor names
Ransom:Win32/Medusa.PA!MTB
Aliases: No associated aliases
Summary
Ransom:Win32/Medusa.PA!MTB represents a persistent threat operated as a ransomware-as-a-service (RaaS) platform. Active since mid-2021, its developers lease the malware to affiliated actors who launch attacks, sharing a percentage of extorted funds. The operation employs double-extortion tactics, encrypting files, and exfiltrating data to pressure victims with the threat of public release. Investigations have documented attacks against hundreds of organizations on a global scale, with a notable focus on healthcare, education, and manufacturing sectors. This strain is a distinct entity from earlier ransomware families using similar names.
The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the Medusa family.
- Upon suspicion of infection, the first step is to physically disconnect the infected device from all networks, including wired, Wi-Fi, and Bluetooth. If the device is part of a larger network, power it down to halt any ongoing data exfiltration or lateral movement attempts.
- Secure memory dumps, disk images, and samples of malicious files for later analysis before altering the device state.
- Wipe infected devices and rebuild using verified, clean backups stored offline or in immutable storage.
- Law enforcement and cybersecurity experts uniformly advise against for paying ransoms, as it encourages further criminal activity and does not guarantee data recovery.
Microsoft Defender Antivirus automatically removes threats as they are detected. However, many infections can leave remnant files and system changes. Updating your antimalware definitions and running a full scan might help address these remnant artifacts.
You can also visit our advanced troubleshooting page or search the Microsoft virus and malware community for more help.