Pysa

Malware updated 2 months ago (2024-07-17T21:17:37.178Z)
Download STIX
Preview STIX
Pysa is a type of ransomware, a malicious software designed to exploit and damage computer systems by encrypting data and demanding ransom for its decryption. The Pysa ransomware group, known for its organizational hierarchy that includes senior executives, system admins, developers, recruiters, HR, and legal teams, claimed credit for an attack in 2020 where they encrypted 440,000 files. The malware is delivered through brute-force attacks on exposed Active Directory services or other management interfaces, spam or phishing email campaigns, and unauthorized Remote Desktop Protocol (RDP) connections to domain controllers. Once inside the system, Pysa attempts to extract sensitive information before encrypting all accessible non-system files using AES implementations, with the keys then encrypted with RSA. CTU researchers have observed various tools used in Pysa ransomware incidents. Advanced Port Scanner was noted as a common tool in Pysa, Snatch, and Hades ransomware incidents. MegaSync was also observed being used in Nefilim, Pysa, and Hades operations. In addition, the Privilege Escalation Awesome Scripts Suite (PEASS) was found to be utilized in both Pysa and REvil incidents. During investigations, the DNSGo RAT was seen leveraging DNS TXT messages for Command and Control (C2) communications in Pysa incidents. The Pysa ransomware group operates a leak site where they post data from organizations that do not comply with their ransom demands. Data stolen by Pysa is used to extort affected organizations into meeting these demands. The group's activities contributed to the prominence of Ransomware-as-a-Service (RaaS) models, alongside other groups like Conti and REvil. However, a significant drop in such activities was observed due to the disappearance of Conti, REvil, and PYSA. Despite this, Pysa continues to pose a significant threat, with its operators constantly seeking ways to improve their tactics and extend their reach.
Description last updated: 2024-07-17T21:15:38.590Z
What's your take? (Question 1 of 2)
Help tune the shared Cybergeist dataset, assist your peers, and earn karma. Expand the panel to get started.
Aliases We are not currently tracking any aliases
Miscellaneous Associations
Other elements of context that could aid in the identification of relevance
Ransomware
Analyst Notes & Discussion
Be the first to leave your mark here! Log in to share your views and vote.
Associated Malware
To see the evidence that has resulted in these malware associations, create a free account
IDTypeVotesProfile Description
ContiUnspecified
2
Conti is a notorious malware and ransomware operation that has caused significant damage to computer systems worldwide. The Conti group, believed to have around 200 employees, operated like a regular business, with internal communications revealing the organization's structure and operations. It was
REvilUnspecified
2
REvil is a type of malware, specifically ransomware, that has been linked to significant cyber attacks. It emerged as part of the Ransomware as a Service (RaaS) model that gained popularity in 2020. This model established relationships between first-stage malware and subsequent ransomware attacks, s
Source Document References
Information about the Pysa Malware was read from the documents corpus below. This display is limited to 20 results, create a free account to see more
PreviewSource LinkCreatedAtTitle
BankInfoSecurity
2 months ago
UK ICO Reprimands London Hackney Council for 2020 Hack
CERT-EU
9 months ago
How One Vulnerable Device Can Spell Disaster | #ransomware | #cybercrime | National Cyber Security Consulting
Checkpoint
10 months ago
The Platform Matters: A Comparative Study on Linux and Windows Ransomware Attacks - Check Point Research
CERT-EU
a year ago
Ransomware resurgence in 2023 | Professional Security
MITRE
2 years ago
PYSA/Mespinoza Ransomware
MITRE
2 years ago
Pysa Ransomware - NHS Digital
MITRE
2 years ago
Rclone Wars: Transferring leverage in a ransomware attack
Secureworks
2 years ago
Ransomware Evolution
Secureworks
2 years ago
Phases of a Post-Intrusion Ransomware Attack
CERT-EU
a year ago
65+ Germany Cybersecurity Statistics, Facts & Trends (2023)
CERT-EU
a year ago
CISA, FBI: Ransomware Gang Exploited PaperCut Flaw Against Education Facilities
CERT-EU
a year ago
Cybersecurity threatscape: year 2021 in review