Pysa

Malware updated 4 months ago (2024-07-17T21:17:37.178Z)
Download STIX
Preview STIX
Pysa is a type of ransomware, a malicious software designed to exploit and damage computer systems by encrypting data and demanding ransom for its decryption. The Pysa ransomware group, known for its organizational hierarchy that includes senior executives, system admins, developers, recruiters, HR, and legal teams, claimed credit for an attack in 2020 where they encrypted 440,000 files. The malware is delivered through brute-force attacks on exposed Active Directory services or other management interfaces, spam or phishing email campaigns, and unauthorized Remote Desktop Protocol (RDP) connections to domain controllers. Once inside the system, Pysa attempts to extract sensitive information before encrypting all accessible non-system files using AES implementations, with the keys then encrypted with RSA. CTU researchers have observed various tools used in Pysa ransomware incidents. Advanced Port Scanner was noted as a common tool in Pysa, Snatch, and Hades ransomware incidents. MegaSync was also observed being used in Nefilim, Pysa, and Hades operations. In addition, the Privilege Escalation Awesome Scripts Suite (PEASS) was found to be utilized in both Pysa and REvil incidents. During investigations, the DNSGo RAT was seen leveraging DNS TXT messages for Command and Control (C2) communications in Pysa incidents. The Pysa ransomware group operates a leak site where they post data from organizations that do not comply with their ransom demands. Data stolen by Pysa is used to extort affected organizations into meeting these demands. The group's activities contributed to the prominence of Ransomware-as-a-Service (RaaS) models, alongside other groups like Conti and REvil. However, a significant drop in such activities was observed due to the disappearance of Conti, REvil, and PYSA. Despite this, Pysa continues to pose a significant threat, with its operators constantly seeking ways to improve their tactics and extend their reach.
Description last updated: 2024-07-17T21:15:38.590Z
What's your take? (Question 1 of 2)
Help tune the shared Cybergeist dataset, assist your peers, and earn karma. Expand the panel to get started.
Aliases We are not currently tracking any aliases
Miscellaneous Associations
Other elements of context that could aid in the identification of relevance
Ransomware
Analyst Notes & Discussion
Be the first to leave your mark here! Log in to share your views and vote.
Associated Malware
To see the evidence that has resulted in these malware associations, create a free account
Alias DescriptionAssociation TypeVotes
The Conti Malware is associated with Pysa. Conti is a type of malware, specifically ransomware, that infiltrates systems to exploit and damage them. Often spreading through suspicious downloads, emails, or websites, it can steal personal information, disrupt operations, or hold data hostage for ransom. Notably, Conti was linked to several raUnspecified
2
The REvil Malware is associated with Pysa. REvil, also known as Sodinokibi, is a malicious software (malware) that operates on a Ransomware as a Service (RaaS) model. This model became increasingly popular in 2020, with first-stage malware like Dridex and Gootkit being linked to ransomware attacks such as BitPaymer and REvil respectively. ThUnspecified
2