FBI Warning: New Ransomware Attacks Email Users with Surprising Methods

Person wearing FBI jacket with yellow lettering

Federal authorities issue alarming warning about Medusa ransomware targeting Gmail and Outlook users, with over 300 victims already impacted and ransom demands reaching up to $15 million.

Key Takeaways

  • The FBI and CISA have issued joint warnings about Medusa ransomware targeting critical industries through phishing campaigns directed at Gmail and Outlook users.
  • Medusa’s operators, identified as a group called Spearwing, conduct “double extortion” attacks by encrypting data and threatening to leak stolen information if ransoms aren’t paid.
  • Ransom demands have ranged from $100,000 to $15 million, with approximately 400 victims documented on the group’s data leak site.
  • Federal agencies recommend implementing multi-factor authentication, maintaining secure offline backups, and creating comprehensive recovery plans to mitigate attacks.
  • Users should verify suspicious emails through independent channels and report unusual activity immediately to IT security teams.

Federal Agencies Sound the Alarm on Ransomware Threat

The FBI and Cybersecurity & Infrastructure Security Agency (CISA) have jointly issued an urgent warning about the Medusa ransomware variant that’s actively targeting users of popular email platforms like Gmail and Outlook. First identified in June 2021, this ransomware operation has significantly escalated its attacks, claiming more than 300 victims as of February 2025. The warning comes as part of the #StopRansomware initiative, designed to help organizations implement effective protections against these increasingly sophisticated cyber threats targeting critical infrastructure sectors including healthcare, government, and education.

Cybersecurity experts have identified a group called Spearwing as the operators behind Medusa. These attackers employ a variety of initial access techniques, primarily focusing on phishing campaigns that trick users into downloading malicious attachments or clicking compromised links. Once inside a victim’s network, the attackers move laterally, exfiltrate sensitive data, and ultimately deploy their ransomware payload. The group has demonstrated advanced capabilities to exploit unpatched vulnerabilities and hijack legitimate accounts to further their attacks.

Double Extortion and Steep Ransom Demands

Medusa employs what security experts call a “double extortion” strategy. This approach involves not only encrypting victims’ data, rendering it inaccessible, but also stealing sensitive information before encryption. The attackers then threaten to publish the stolen data on their leak site if the ransom isn’t paid, creating additional pressure on victims. According to federal authorities, ransom demands have ranged from $100,000 to as high as $15 million, with the specific amount often tailored to the victim’s perceived ability to pay.

“Like the majority of ransomware operators, Spearwing and its affiliates carry out double extortion attacks, stealing victims’ data before encrypting networks in order to increase the pressure on victims to pay a ransom. If victims refuse to pay, the group threatens to publish the stolen data on their data leaks site,” cybersecurity brand Symantec wrote in a recent blog.

The Medusa operation has shown remarkable growth. Spearwing has documented approximately 400 victims on their data leak site since early 2023. The group actively recruits access brokers, paying them between $100 and $1 million for initial access to targeted networks. This business model has enabled them to scale their operations rapidly, attacking organizations across multiple sectors. Healthcare organizations have been particularly vulnerable, with the attackers specifically targeting and hijacking legitimate accounts within these institutions.

Recommended Security Measures and Prevention Strategies

Federal authorities have outlined several critical security measures to help protect against Medusa and similar ransomware threats. Organizations are advised to develop comprehensive recovery plans with multiple data copies stored in secure, offline locations. Implementing strong authentication protocols, including multi-factor authentication and regularly changed complex passwords, creates significant barriers to unauthorized access. Network segmentation prevents attackers from moving laterally if they breach one system, while keeping software patched closes known vulnerabilities.

For individual users, vigilance remains essential. Phishing emails often mimic legitimate communications from trusted sources, using social engineering tactics like impersonating executives or colleagues. Users should independently verify suspicious emails or unusual requests through separate communication channels before taking any action. When receiving unexpected attachments or links, even from seemingly familiar senders, it’s critical to exercise caution. Suspicious activity should be reported immediately to IT security teams to minimize potential damage, as early detection can dramatically reduce the impact of an attack.