Rhysida

Threat Actor updated 4 days ago (2024-09-03T16:17:42.619Z)
Download STIX
Preview STIX
Rhysida, a threat actor active since May 2023, is responsible for a series of ransomware attacks, with a significant focus on the healthcare sector. It accounts for 8% of total cyberattacks, with 38% of its attacks targeting healthcare institutions. The group's modus operandi includes transferring Rhysida ransomware over HTTP/S and emailing it as a compressed attachment, both for infiltration and lateral movement. A notable case involved the breach of Bayhealth Hospital in Delaware, which was later confirmed by the group on their Tor leak site. This isn't the first time Rhysida targeted a hospital, highlighting their persistent threat to the healthcare industry. In December 2023, a joint Cybersecurity Advisory (CSA) was published by the FBI and CISA to warn about Rhysida's ransomware attacks. Despite these efforts, the group continued its malicious activities into 2024. On August 8, 2024, after unsuccessful attempts to monetize their illicit activities, Rhysida published approximately half of the stolen data they claimed to have, comprising 260,000 files (3.1 TB). This publication of data reflects the group's aggressive tactics when initial plans do not yield expected results. The Rhysida group also attempted to auction the stolen data, starting the bid at around $1.7 million in bitcoin. This tactic indicates the group's determination to monetize the breached information, further emphasizing their threat level. Additionally, Rhysida maintains a leak site where they post information about recent victims unwilling to pay ransoms, further exemplifying their intimidation tactics. As such, the Rhysida group represents a significant and ongoing cybersecurity threat, particularly to the healthcare sector.
Description last updated: 2024-09-03T16:17:01.300Z
What's your take? (Question 1 of 5)
Help tune the shared Cybergeist dataset, assist your peers, and earn karma. Expand the panel to get started.
Possible Aliases / Cluster overlaps
It's hard to track cluster overlaps and naming conventions between vendors, so here are some possible overlapping names / profiles you also may want to look at.
IDVotesProfile Description
Vice Society
7
Vice Society, a threat actor group known for its malicious activities, has been linked to a series of ransomware attacks targeting various sectors, most notably education and healthcare. Throughout 2022 and the first half of 2023, Vice Society, along with Royal Ransomware, were actively executing mu
Miscellaneous Associations
Other elements of context that could aid in the identification of relevance
Ransomware
Ransom
RaaS
Malware
Lateral Move...
Extortion
Bitcoin
Windows
Encryption
Vulnerability
Payload
Phishing
Data Leak
Healthcare
Health
Exploit
Medical
Cybercrime
Ransomware P...
Tool
British
Fortiguard
Hse
Cobalt Strike
Exploits
Encrypt
Spyware
Locker
Hospitals
Linux
Zero Day
Github
Telegram
Apt
Kaspersky
Vpn
t1021.004
t1003.003
t1070.001
CISA
Analyst Notes & Discussion
Be the first to leave your mark here! Log in to share your views and vote.
Associated Malware
To see the evidence that has resulted in these malware associations, create a free account
IDTypeVotesProfile Description
Rhysida RansomwareUnspecified
11
Rhysida ransomware is a malicious software that infiltrates systems, often without the knowledge of the user, with the intention to exploit and damage the system. It can infect systems through suspicious downloads, emails, or websites. Once inside, it can steal personal information, disrupt operatio
LockbitUnspecified
4
LockBit is a malicious software, or malware, that has been notably active and damaging in the cyber world. Known for its ability to infiltrate systems often without detection, it can steal personal information, disrupt operations, and even hold data hostage for ransom. In the first half of 2024, Loc
SystembcUnspecified
2
SystemBC is a type of malware, or malicious software, that has been heavily utilized in cyber-attacks and data breaches. Throughout 2023, it was frequently used in conjunction with other malware like Quicksand and BlackBasta by cybercriminals to exploit vulnerabilities in computer systems. Play rans
3amUnspecified
2
3AM is a new and emerging malware strain that has recently made its presence known in the cybersecurity landscape. As a form of ransomware, it is a malicious software designed to infiltrate systems surreptitiously, often through suspicious downloads, emails, or websites. Once inside a system, 3AM wo
ClopUnspecified
2
Clop, also known as Cl0p, is a notorious ransomware group responsible for several high-profile cyberattacks. The group specializes in exploiting vulnerabilities in software and systems to gain unauthorized access, exfiltrate sensitive data, and then extort victims by threatening to release the stole
Associated Threat Actors
To see the evidence that has resulted in these threatActor associations, create a free account
IDTypeVotesProfile Description
AlphvUnspecified
2
Alphv is a threat actor group known for its malicious activities in the cyber world. They have been particularly active in deploying ransomware attacks, with one of their most significant actions being the theft of 5TB of data from Morrison Community Hospital. This act not only disrupted hospital op
MedusaUnspecified
2
Medusa, a malicious threat actor known for its ransomware attacks, has been increasingly active and dangerous. This group was responsible for a significant rise in data leaks and multi-extortion activities throughout 2023. Medusa, along with other ransomware groups like LockBit and ALPHV (BlackCat),
Associated Vulnerabilities
To see the evidence that has resulted in these vulnerability associations, create a free account
IDTypeVotesProfile Description
ZerologonUnspecified
2
Zerologon, also known as CVE-2020-1472, is a critical vulnerability within Microsoft's Netlogon Remote Protocol that affects all versions of Windows Server OS from 2008 onwards. The flaw allows attackers to bypass authentication mechanisms and alter computer passwords within a domain controller's Ac
CVE-2020-1472Exploited
2
CVE-2020-1472, also known as the ZeroLogon vulnerability, is a critical-severity privilege escalation flaw in Microsoft's Netlogon Remote Protocol. It was patched by Microsoft on August 11, 2020. This vulnerability allows attackers to gain administrative access to a Windows domain controller without
Source Document References
Information about the Rhysida Threat Actor was read from the documents corpus below. This display is limited to 20 results, create a free account to see more
PreviewSource LinkCreatedAtTitle
BankInfoSecurity
2 days ago
RansomHub Claims Theft of Montana Planned Parenthood Data
DARKReading
4 days ago
City of Columbus Sues Researcher After Ransomware Attack
Malwarebytes
4 days ago
City of Columbus tries to silence security researcher | Malwarebytes
InfoSecurity-magazine
17 days ago
Healthcare Hit by a Fifth of Ransomware Incidents
Securityaffairs
a month ago
Rhysida Ransomware gang claims the hack of Bayhealth Hospital
CERT-EU
9 months ago
‘This experience has been extremely distressing’: Insomniac shares a statement in response to catastrophic ransomware attack, including hopes for Wolverine’s future | #ransomware | #cybercrime
Securityaffairs
2 months ago
MarineMax data breach impacted over 123,000 individuals
BankInfoSecurity
2 months ago
What's the Best Strategy for Exploiting Flaws in Ransomware?
BankInfoSecurity
2 months ago
Children's Hospital Notifies 800,000 of Data Theft in Attack
DARKReading
2 months ago
Key Takeaways From the British Library Cyberattack
Securelist
4 months ago
Kaspersky Anti-Ransomware Day report 2024
Malwarebytes
5 months ago
2024 State of Malware in Education report: Top 6 cyberthreats facing K-12 and Higher Ed | Malwarebytes
Malwarebytes
5 months ago
3 important lessons from a devastating ransomware attack | Malwarebytes
BankInfoSecurity
6 months ago
Ransomware Groups: Trust Us. Uh, Don't.
CERT-EU
6 months ago
GRIT Ransomware Report: February 2024 | #ransomware | #cybercrime | National Cyber Security Consulting
CERT-EU
6 months ago
The British Library looks to the future as it reveals the incalculable damage of its ransomware attack | #ransomware | #cybercrime | National Cyber Security Consulting
CERT-EU
6 months ago
WEF effort to disrupt cybercrime moves into operations phase
CERT-EU
6 months ago
Ransomware attackers claim they sold Lurie Children's Hospital data for $3.4 million on dark web | #ransomware | #cybercrime | National Cyber Security Consulting
CERT-EU
6 months ago
Lurie Children’s Hospital investigating if stolen data was sold online – NBC Chicago | #ransomware | #cybercrime | National Cyber Security Consulting
CERT-EU
6 months ago
Alert: FBI Warns Of BlackCat Ransomware Healthcare Attack