Medusa Ransomware Group Claims Cyberattack on Canadian Psychological Association

The group shared details of the Canadian Psychological Association data breach on their dark web channel, "MEDUSA BLOG", including a countdown timer adding pressure to the situation.

The Canadian Psychological Association (CPA), the primary representative body for psychologists across Canada, has allegedly fallen victim to a cyberattack by the notorious Medusa ransomware group. 

This incident highlights the increasing threats posed by cybercriminals targeting organizations with sensitive information. The CPA, established in 1939 and incorporated under the Canada Corporations Act in May 1950, now grapples with the aftermath of this breach.

The Canadian Psychological Association Cyberattack

Source: Twitter

Medusa, a notorious cyber threat actor, has claimed responsibility for the attack on the CPA. The group shared details of the Canadian Psychological Association data breach on their dark web channel, “MEDUSA BLOG”, including a countdown timer adding pressure to the situation. 

They have imposed ultimatums, demanding $10,000 to delay the publication of compromised data by another day, and a staggering $200,000 for the complete deletion of the data, which can then be downloaded again.

As of now, the CPA has not issued an official response or statement regarding the Canadian Psychological Association data breach. The Cyber Express has reached out to the organization to gather insights into the incident, but no information has been provided at the time of writing.

Medusa Ransomware Group Recent Attacks

This cyberattack on the CPA is not an isolated incident. Recently, the Minneapolis Public School (MPS) District experienced a large scale ransomware attack. In this case, highly sensitive information about students and teachers, including allegations of abuse and psychological reports, was exposed on the internet.

MPS initially refused to pay a $1 million ransom and successfully restored their encrypted systems through backups. However, the Medusa hacking group had not only encrypted the data but also exfiltrated their own copy, subsequently publishing it on the web and promoting it through links on a Telegram channel.

Understanding the MedusaLocker Ransomware

MedusaLocker Ransomware, first observed in September 2019, primarily targets Windows machines through SPAM. This malware exhibits unique behavior, including booting up in safe mode before execution and file encryption. It utilizes BAT files and PowerShell depending on the variant. The infected machine may encounter errors during boot-up due to alterations made by the latest variant.

Following initial access, MedusaLocker spreads through a network via a batch file executing a PowerShell script. It disables security and forensic software, restarts the machine in safe mode to evade detection, and then employs AES-256 encryption to lock files. Additionally, it eliminates local backups, disables start-up recovery, and leaves a ransom note in every folder containing compromised data.

This is an ongoing story and The Cyber Express is keeping a close look at the Canadian Psychological Association data breach. We’ll update this post once we have more information on the alleged attack

Media Disclaimer: This report is based on internal and external research obtained through various means. The information provided is for reference purposes only, and users bear full responsibility for their reliance on it. The Cyber Express assumes no liability for the accuracy or consequences of using this information.

Ashish Khaitan

Ashish is a technical writer at The Cyber Express. He adores writing about the latest technologies and covering the latest cybersecurity events. In his free time, he likes to play horror and open-world video games.

Recent Posts

Finland Warns Russia and China Cyber Espionage Ops Targeting Tech Sector

For Finland, this means that protecting innovation and industrial development has become closely tied to national security.

5 hours ago

Microsoft Patch Tuesday March 2026: Two Zero-Days and Critical RCE Bugs Fixed

Microsoft Patch Tuesday March 2026 patches 79 flaws, including two zero-day vulnerabilities and critical remote code execution issues.

5 hours ago

FBI Flags Phishing Campaign Collecting Planning and Zoning Permit Payments

Reporting these scams helps investigators identify patterns and disrupt criminal networks running permit payment fraud schemes.

8 hours ago

Iran’s Fake “Shelter Danger” Calls Part of Psychological Cyber Warfare Playbook

When your phone rings and the caller ID shows the Israeli military's emergency command number, most people would listen —…

9 hours ago

Cyber Risk Management Starts with Understanding the Business: CISO Hannah Suarez Explains Why

As organizations continue to evolve digitally, the challenge for CISOs will be balancing innovation with responsible cyber risk management.

1 day ago

Cyberattack Forces Polish Hospital Revert to Paper-Based Operations

Following a cyberattack, Szczecin’s Public Regional Hospital switches to paper-based workflow while keeping patient care safe and continuous.

1 day ago

This website uses cookies. By continuing to use this website you are giving consent to cookies being used.

Read More