Rhysida

Threat Actor updated 19 hours ago (2024-11-20T17:34:48.439Z)
Download STIX
Preview STIX
Rhysida is a globally active threat actor known for its ransomware operations, which have impacted a wide range of sectors, particularly the government and public sector. Their use of CleanUpLoader makes their operations highly effective and difficult to detect, as it not only facilitates persistence but also enables Rhysida actors to exfiltrate valuable data before deploying the ransomware. High-profile breaches include the attack on King Edward VII’s Hospital in London in 2023, where Rhysida claimed to have stolen sensitive information from hospital staff and patients, including members of the British royal family. Additionally, attacks on the Chilean Army and the City of Columbus demonstrate Rhysida's ability to infiltrate critical public sector infrastructures. The group uses various infiltration and lateral movement methods such as transferring ransomware over HTTP/S and emailing ransomware as a compressed attachment. These tactics were identified in SafeBreach's coverage of Rhysida's actions, specifically in reports #9075, #9074, #9077, and #9076. The sophistication of Rhysida’s operations means that defending against this ransomware requires a proactive and intelligence-driven approach. By understanding Rhysida’s tactics, security teams can implement more effective defensive strategies to mitigate the impact of this and other advanced ransomware families. Monitoring Rhysida’s infrastructure, including typosquatting domains and CleanUpLoader C2 servers, has been key in detecting their activities. The Insikt Group found that Rhysida victims could be detected on average 30 days before appearing on public extortion sites, indicating an opportunity for early intervention. Given the significant threat Rhysida poses across industries, it is crucial for organizations to maintain vigilant cybersecurity practices and stay updated on Rhysida's evolving tactics.
Description last updated: 2024-11-15T16:18:59.638Z
What's your take? (Question 1 of 5)
Help tune the shared Cybergeist dataset, assist your peers, and earn karma. Expand the panel to get started.
Possible Aliases / Cluster overlaps
It's hard to track cluster overlaps and naming conventions between vendors, so here are some possible overlapping names / profiles you also may want to look at. Create a free account to see the source evidence for each alias, and help fix any errors.
Alias DescriptionVotes
Vice Society is a possible alias for Rhysida. Vice Society, a threat actor or hacking team with malicious intent, has been active since 2022 and has made significant waves in the cybersecurity world. The group is known for deploying various forms of ransomware, including BlackCat, Quantum Locker, Zeppelin, and their own branded variant of Zeppe
7
Miscellaneous Associations
Other elements of context that could aid in the identification of relevance
Ransomware
Ransom
Malware
RaaS
Extortion
Lateral Move...
Bitcoin
Windows
Vulnerability
Encryption
Data Leak
Phishing
Payload
Locker
Ransomware P...
Exploit
Cybercrime
Medical
Healthcare
Health
Hse
Fortiguard
Cobalt Strike
Exploits
Encrypt
Spyware
Hospitals
Linux
Zero Day
Github
Telegram
Apt
Backdoor
Kaspersky
Vpn
t1021.004
t1003.003
t1070.001
CISA
Tool
British
Analyst Notes & Discussion
Be the first to leave your mark here! Log in to share your views and vote.
Associated Malware
To see the evidence that has resulted in these malware associations, create a free account
Alias DescriptionAssociation TypeVotes
The Rhysida Ransomware Malware is associated with Rhysida. The Rhysida ransomware, a malicious software known for exploiting and damaging computer systems, has been actively disrupting cybersecurity since May 2023. This malware infects systems through suspicious downloads, emails, or websites, often without the user's knowledge. Once inside, it can steal peUnspecified
12
The Lockbit Malware is associated with Rhysida. LockBit is a malicious software, or malware, known for its damaging and exploitative functions. It infiltrates systems via dubious downloads, emails, or websites, often without the user's knowledge, and can steal personal information, disrupt operations, or hold data hostage for ransom. The LockBit Unspecified
5
The Systembc Malware is associated with Rhysida. SystemBC is a type of malware, or malicious software, known for its disruptive and exploitative nature. It infiltrates systems through dubious downloads, emails, or websites, often unbeknownst to the user. Once embedded, it can steal personal information, interrupt operations, or hold data hostage fUnspecified
2
The 3am Malware is associated with Rhysida. 3AM is a new ransomware family that emerged in the cyber threat landscape, as discovered by Symantec's Threat Hunter Team in September 2023. This malicious software, written in Rust, is designed to exploit and damage computer systems, often infiltrating them without the user's knowledge through suspUnspecified
2
The Clop Malware is associated with Rhysida. Clop, a malicious software (malware), is linked to a Russian-speaking cybercriminal group also known as Cl0p. It is designed to exploit and damage computer systems by stealing personal information, disrupting operations, or holding data hostage for ransom. In May 2023, the Clop group began exploitinUnspecified
2
Associated Threat Actors
To see the evidence that has resulted in these threatActor associations, create a free account
Alias DescriptionAssociation TypeVotes
The Alphv Threat Actor is associated with Rhysida. Alphv, also known as BlackCat, is a notable threat actor in the cybersecurity landscape. Originating from Russia, this cybercriminal group has been involved in multiple high-profile ransomware attacks, specifically targeting healthcare providers. They gained significant attention after stealing 5TB Unspecified
5
The Medusa Threat Actor is associated with Rhysida. Medusa, a threat actor group known for its malicious activities, has been increasingly involved in multiple high-profile cyber attacks. In November 2023, Medusa and other groups like LockBit and ALPHV (BlackCat) exploited a zero-day vulnerability, the Citrix Bleed (CVE-2023-4966), leading to numerouUnspecified
2
The Bianlian Threat Actor is associated with Rhysida. BianLian is a threat actor group known for its malicious activities, primarily involving ransomware attacks. The group has been particularly active in 2024, exploiting bugs in JetBrains TeamCity software to launch its attacks. This method of attack has caused significant disruptions and data breacheUnspecified
2
Associated Vulnerabilities
To see the evidence that has resulted in these vulnerability associations, create a free account
Alias DescriptionAssociation TypeVotes
The Zerologon Vulnerability is associated with Rhysida. Zerologon, officially known as CVE-2020-1472, is a critical vulnerability within Microsoft's Netlogon Remote Protocol. This flaw allows attackers to bypass authentication mechanisms and alter computer passwords within a domain controller's Active Directory, enabling them to escalate privileges to doUnspecified
2
The CVE-2020-1472 Vulnerability is associated with Rhysida. CVE-2020-1472, also known as the "ZeroLogon" vulnerability, is a critical-severity flaw in Microsoft's Netlogon Remote Protocol. This vulnerability, which was patched on August 11, 2020, allows attackers to escalate privileges and gain administrative access to a Windows domain controller without anyExploited
2
Source Document References
Information about the Rhysida Threat Actor was read from the documents corpus below. This display is limited to 20 results, create a free account to see more
PreviewSource LinkCreatedAtTitle
BankInfoSecurity
a month ago
Recorded Future
a month ago
BankInfoSecurity
14 days ago
Securityaffairs
16 days ago
InfoSecurity-magazine
17 days ago
BankInfoSecurity
a month ago
Checkpoint
a month ago
BankInfoSecurity
2 months ago
Securityaffairs
2 months ago
DARKReading
2 months ago
Securityaffairs
2 months ago
BankInfoSecurity
3 months ago
DARKReading
3 months ago
Malwarebytes
3 months ago
InfoSecurity-magazine
3 months ago
Securityaffairs
3 months ago
CERT-EU
a year ago
Securityaffairs
4 months ago
BankInfoSecurity
4 months ago
BankInfoSecurity
5 months ago