Medusa Ransomware Turns Your Files to Stone

Ok. The Medusa Ransomware doesn’t REALLY turn your files to stone, but it makes them just as useless and inaccessible. This latest ransomware burst on the scene in late September and according to Bleeping Computer it appears to be getting distributed worldwide with victims scattered around the globe. Researchers have not yet identified just how Medusa is being spread though we can surmise it is through the usual channels such as phishing, downloads and watering holes.

Just Getting Started

Only time will tell just how big and ugly Medusa will get but submissions to ID Ransomware have been streaming in.

Despite the steady stream of victims reporting in, Medusa is so new very little is known about how it is being spread and even whether or not if you pay the requested ransom you will receive a decryption key!

According to the ransom note generated by Medusa you can email them one of your encrypted files and they will decrypt it for free to prove that they can indeed unlock your files before you send them payment. Speaking of payment, at this time it is not clear from the ransom note posted on Bleeping Computer (shown below) exactly how much you need to send! Perhaps these guys should get some third party help with their ransom demands?

All your data are encrypted!

What happened?

Your files are encrypted, and currently unavailable.

You can check it: all files on you computer has new expansion.

By the way, everything is possible to recover (restore), but you need to buy a unique decryptor.

Otherwise, you never cant return your data.

For purchasing a decryptor contact us by email:

If you will get no answer within 24 hours contact us by our alternate emails:

What guarantees?

Its just a business. If we do not do our work and liabilities – nobody will not cooperate with us.

To verify the possibility of the recovery of your files we can decrypted 1 file for free.

Attach 1 file to the letter (no more than 10Mb). Indicate your personal ID on the letter:




– Attempts of change files by yourself will result in a loose of data.

– Our e-mail can be blocked over time. Write now, loss of contact with us will result in a loose of data.

– Use any third party software for restoring your data or antivirus solutions will result in a loose of data.

– Decryptors of other users are unique and will not fit your files and use of those will result in a loose of data.

– If you will not cooperate with our service – for us, its does not matter. But you will lose your time and data, cause just we have the private key.

Security Expertise You Can Count On

Whether it is ransomware, brute force hacking, phishing or some other cyber threat, Konsultek has the tools and talent to develop the right security solution for your particular situation.  Not sure just how robust your network security is? No problem! Let our experts check your network’s vulnerability for free.

Our team of experts is happy to provide an outside, independent and unbiased analysis of your network’s security. Simply give us a call or click here:

You’ll receive a complimentary Executive Risk Assessment. This assessment will not only show you the risk and impact to your most critical digital assets but demonstrate the likelihood of a breach happening.

© Copyright 2018 Konsultek