01 logo

FBI Warns of Rising Phishing Attacks Targeting Gmail and Outlook Users

Medusa ransomware slams critical infrastructure organizations

By Jason “Jay” BenskinPublished 10 months ago 3 min read
FBI Warns of Rising Phishing Attacks Targeting Gmail and Outlook Users
Photo by Stephen Phillips - Hostreviews.co.uk on Unsplash

As highlighted in a recent Apple News report (Apple News), the Federal Bureau of Investigation (FBI) has issued an urgent alert regarding an uptick in sophisticated phishing scams targeting users of popular email services like Gmail and Outlook. These cyberattacks are designed to manipulate individuals into revealing sensitive personal information or unknowingly installing malware by masquerading as trusted entities.

Phishing schemes often take the form of emails that appear authentic but contain deceptive links. Clicking on these links can lead users to fraudulent websites engineered to harvest login credentials or deploy malicious software without their knowledge. The FBI emphasizes the importance of heightened awareness and proactive security measures to combat these evolving threats.

To help users protect themselves, the FBI advises:

- Verifying Email Authenticity – Be cautious when receiving unexpected emails, particularly those that request personal information or demand immediate action. Scammers often use urgency to provoke hasty responses.

- Inspecting Links Carefully – Before clicking, hover over links to verify their true destination and ensure they lead to legitimate websites.

- Enabling Two-Factor Authentication (2FA) – Adding an extra layer of security can help protect accounts, even if login credentials are compromised.

- Keeping Software Updated – Regularly updating operating systems and applications helps seal security vulnerabilities and protect against emerging cyber threats.

With phishing tactics becoming increasingly sophisticated, staying informed and adopting these cybersecurity best practices can significantly reduce the risk of falling victim to online scams. For more details on the FBI’s warning, refer to the full Apple News report (here).

Intelligence on Medusa Ransomware:

The Medusa ransomware group has significantly escalated its operations, targeting over 300 organizations across critical infrastructure sectors, including healthcare, manufacturing, and technology.

Reference: CYBERSECURITYDIVE.COM

This surge has prompted joint advisories from the Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), and the Multi-State Information Sharing and Analysis Center (MS-ISAC).

Reference: CISA.GOV

Evolution and Operational Model

Since its emergence in 2021, Medusa has transitioned from a closed ransomware operation to a Ransomware-as-a-Service (RaaS) model. In this structure, developers recruit affiliates to conduct attacks, sharing a portion of the illicit proceeds. Despite this shift, critical operations, such as ransom negotiations, remain under the direct control of the core developers.

As referenced by: CYBERSECURITYDIVE.COM

Tactics, Techniques, and Procedures (TTPs)

Medusa actors employ a variety of sophisticated tactics to infiltrate and exploit victim networks:

Initial Access: They often collaborate with initial access brokers on cybercriminal forums to gain entry into target environments.

Lateral Movement: Utilizing legitimate remote access tools—such as AnyDesk, Atera, and ConnectWise—they move laterally within networks, making detection more challenging.

Evasion Techniques: By employing "living-off-the-land" (LotL) methods and PowerShell scripts, Medusa actors execute malicious activities without triggering security alerts.

Disabling Security Measures: A notable tactic involves the "bring your own vulnerable driver" (BYOVD) approach, where attackers exploit legitimate but vulnerable drivers to disable endpoint detection and response (EDR) tools.

Recent Activity and Impact

Reference (SECURITYWEEK.COM) In 2024, Medusa's activities surged by 42% compared to the previous year, with a continued upward trend observed into early 2025. The group has been implicated in attacks across various countries, affecting sectors such as education, health, legal, insurance, technology, and manufacturing.

Recommendations for Organizations

To mitigate the threat posed by Medusa ransomware, organizations are advised to implement the following measures:

As referenced by CISA.GOV (CyberSecurity and Infrastructure Security Agency)

Update Systems: Regularly patch operating systems, software, and firmware to address known vulnerabilities.

Enhance Authentication: Employ multifactor authentication (MFA) across all services to add an extra layer of security.

Restrict Scripting Activities: Disable command-line and scripting activities and permissions to limit the use of LotL techniques by attackers.

Network Segmentation: Implement network segmentation to prevent lateral movement within networks, thereby containing potential breaches.

By adopting these proactive measures, organizations can strengthen their defenses against the evolving threat landscape posed by Medusa ransomware and similar malicious actors.

References:

hackers

About the Creator

Jason “Jay” Benskin

Crafting authored passion in fiction, horror fiction, and poems.

Creationati

L.C.Gina Mike Heather Caroline Dharrsheena Cathy Daphsam Misty JBaz D. A. Ratliff Sam Harty Gerard Mark Melissa M Combs Colleen

Reader insights

Outstanding

Excellent work. Looking forward to reading more!

Top insights

  1. Compelling and original writing

    Creative use of language & vocab

  2. Easy to read and follow

    Well-structured & engaging content

  3. Excellent storytelling

    Original narrative & well developed characters

  1. Expert insights and opinions

    Arguments were carefully researched and presented

  2. Eye opening

    Niche topic & fresh perspectives

  3. Heartfelt and relatable

    The story invoked strong personal emotions

  4. Masterful proofreading

    Zero grammar & spelling mistakes

  5. On-point and relevant

    Writing reflected the title & theme

Add your insights

Comments (5)

Sign in to comment
  • Azra parveen10 months ago

    Great

  • Milan Milic10 months ago

    Great insight! Cyber threats like phishing and ransomware are evolving fast—it's crucial to stay vigilant. Thanks for sharing these important security tips!

  • Mark Graham10 months ago

    Thanks for all the information and warnings. I do not use Outlook or gmail a lot. Good job.

  • Very good work 👏

  • Alex H Mittelman 10 months ago

    I hate phishing attacks! I’ll Keep an eye open 👍🏼🖤

Find us on social media

Miscellaneous links

  • Explore
  • Contact
  • Privacy Policy
  • Terms of Use
  • Support

© 2026 Creatd, Inc. All Rights Reserved.