Medusa, also known as MedusaLocker, is a financially motivated ransomware group that emerged in November 2022 and has since compromised 568 known victims across multiple countries. The group's origin and specific affiliations remain unclear from publicly available intelligence, though their operational patterns suggest they function as an independent ransomware operation rather than a documented Ransomware-as-a-Service model. Medusa primarily targets organizations in the United States, United Kingdom, Canada, Italy, and Australia, with a focus on business services, healthcare, manufacturing, and technology sectors, employing typical ransomware tactics including data encryption and likely exfiltration for double extortion purposes, though specific technical methodologies and initial access vectors have not been extensively documented in public threat intelligence reports. While the group has maintained a relatively high victim count since its emergence, detailed information about specific notable campaigns, high-profile victims, or major ransom demands has not been widely reported by major cybersecurity firms or law enforcement agencies. As of current intelligence assessments, Medusa appears to remain active in the threat landscape, continuing to target organizations across their established geographic and sectoral preferences. The group has been linked to 568 public disclosures across our corpus. First observed on a leak site on November 15, 2022; most recent post February 14, 2026. The operation is currently active.
Also tracked as: MedusaLocker.
Sector and geography
This disclosure adds to ransomware activity in the Business Services sector, which has 2,640 disclosures indexed across all operators we track. Geographically, Centennial Law Group LLP is reported in Canada, a country with 810 ransomware disclosures in our corpus.
How we know this. Darkfield monitors public ransomware leak sites continuously, archiving every new disclosure and the data later released against the victim. Each entry on this page is sourced from the operator's own publication and cross-checked against complementary OSINT feeds (RansomLook, ransomware.live, RansomWatch). We do not collect or host stolen data — only the metadata, timestamps and screenshots needed to make the public disclosure searchable and accountable. Records here are corrected when the original post is edited, retracted, or merged with another disclosure.