Rhysida

Threat Actor updated 22 days ago (2024-11-29T14:02:14.415Z)
Download STIX
Preview STIX
Rhysida is a globally active threat actor known for its ransomware operations, which have impacted a wide range of sectors, particularly the government and public sector. Their use of CleanUpLoader makes their operations highly effective and difficult to detect, as it not only facilitates persistence but also enables Rhysida actors to exfiltrate valuable data before deploying the ransomware. High-profile breaches include the attack on King Edward VII’s Hospital in London in 2023, where Rhysida claimed to have stolen sensitive information from hospital staff and patients, including members of the British royal family. Additionally, attacks on the Chilean Army and the City of Columbus demonstrate Rhysida's ability to infiltrate critical public sector infrastructures. The group uses various infiltration and lateral movement methods such as transferring ransomware over HTTP/S and emailing ransomware as a compressed attachment. These tactics were identified in SafeBreach's coverage of Rhysida's actions, specifically in reports #9075, #9074, #9077, and #9076. The sophistication of Rhysida’s operations means that defending against this ransomware requires a proactive and intelligence-driven approach. By understanding Rhysida’s tactics, security teams can implement more effective defensive strategies to mitigate the impact of this and other advanced ransomware families. Monitoring Rhysida’s infrastructure, including typosquatting domains and CleanUpLoader C2 servers, has been key in detecting their activities. The Insikt Group found that Rhysida victims could be detected on average 30 days before appearing on public extortion sites, indicating an opportunity for early intervention. Given the significant threat Rhysida poses across industries, it is crucial for organizations to maintain vigilant cybersecurity practices and stay updated on Rhysida's evolving tactics.
Description last updated: 2024-11-15T16:18:59.638Z
What's your take? (Question 1 of 5)
Help tune the shared Cybergeist dataset, assist your peers, and earn karma. Expand the panel to get started.
Possible Aliases / Cluster overlaps
It's hard to track cluster overlaps and naming conventions between vendors, so here are some possible overlapping names / profiles you also may want to look at. Create a free account to see the source evidence for each alias, and help fix any errors.
Alias DescriptionVotes
Vice Society is a possible alias for Rhysida. Vice Society, a threat actor or hacking team with malicious intent, has been active since 2022 and has made significant waves in the cybersecurity world. The group is known for deploying various forms of ransomware, including BlackCat, Quantum Locker, Zeppelin, and their own branded variant of Zeppe
7
Miscellaneous Associations
Other elements of context that could aid in the identification of relevance
Ransomware
Ransom
Malware
RaaS
Extortion
Lateral Move...
Bitcoin
Windows
Vulnerability
Encryption
Data Leak
Phishing
Payload
Locker
Ransomware P...
Exploit
Cybercrime
Medical
Healthcare
Health
Hse
Fortiguard
Cobalt Strike
Exploits
Encrypt
Spyware
Hospitals
Linux
Zero Day
Github
Telegram
Apt
Backdoor
Kaspersky
Vpn
t1021.004
t1003.003
t1070.001
CISA
Tool
British
Analyst Notes & Discussion
Be the first to leave your mark here! Log in to share your views and vote.
Associated Malware
To see the evidence that has resulted in these malware associations, create a free account
Alias DescriptionAssociation TypeVotes
The Rhysida Ransomware Malware is associated with Rhysida. The Rhysida ransomware, a malicious software known for exploiting and damaging computer systems, has been actively disrupting cybersecurity since May 2023. This malware infects systems through suspicious downloads, emails, or websites, often without the user's knowledge. Once inside, it can steal peUnspecified
12
The Lockbit Malware is associated with Rhysida. LockBit is a prominent ransomware-as-a-service (RaaS) malware that has been involved in numerous cyberattacks, demonstrating its staying power and adaptability. The malware, which can infiltrate systems through suspicious downloads, emails, or websites, is designed to exploit and damage computers orUnspecified
5
The Systembc Malware is associated with Rhysida. SystemBC is a type of malware, or malicious software, known for its disruptive and exploitative nature. It infiltrates systems through dubious downloads, emails, or websites, often unbeknownst to the user. Once embedded, it can steal personal information, interrupt operations, or hold data hostage fUnspecified
2
The 3am Malware is associated with Rhysida. 3AM is a new ransomware family that emerged in the cyber threat landscape, as discovered by Symantec's Threat Hunter Team in September 2023. This malicious software, written in Rust, is designed to exploit and damage computer systems, often infiltrating them without the user's knowledge through suspUnspecified
2
The Clop Malware is associated with Rhysida. Clop, a malicious software (malware), is linked to a Russian-speaking cybercriminal group also known as Cl0p. It is designed to exploit and damage computer systems by stealing personal information, disrupting operations, or holding data hostage for ransom. In May 2023, the Clop group began exploitinUnspecified
2
Associated Threat Actors
To see the evidence that has resulted in these threatActor associations, create a free account
Alias DescriptionAssociation TypeVotes
The Alphv Threat Actor is associated with Rhysida. Alphv, also known as BlackCat, is a threat actor group that has been linked to numerous cyberattacks, particularly targeting the healthcare sector. The group made headlines when it stole 5TB of data from Morrison Community Hospital, causing significant disruption and raising concerns about patient pUnspecified
5
The Medusa Threat Actor is associated with Rhysida. Medusa, a threat actor group known for its malicious activities, has been increasingly involved in multiple high-profile cyber attacks. In November 2023, Medusa and other groups like LockBit and ALPHV (BlackCat) exploited a zero-day vulnerability, the Citrix Bleed (CVE-2023-4966), leading to numerouUnspecified
2
The BianLian Threat Actor is associated with Rhysida. BianLian is a threat actor that has been active in cybercrime, leveraging various techniques for malicious intent. Prior to January 2024, the group used an encryptor (encryptor.exe) that modified all encrypted files to have the .bianlian extension and created a ransom note in each affected directoryUnspecified
2
Associated Vulnerabilities
To see the evidence that has resulted in these vulnerability associations, create a free account
Alias DescriptionAssociation TypeVotes
The Zerologon Vulnerability is associated with Rhysida. Zerologon (CVE-2020-1472) is a critical vulnerability within Microsoft's Netlogon Remote Protocol that emerged in 2020. It involves a privilege escalation condition that allows an attacker to establish a vulnerable Netlogon secure channel connection to a domain controller, bypassing authentication mUnspecified
2
The CVE-2020-1472 Vulnerability is associated with Rhysida. CVE-2020-1472, also known as the "ZeroLogon" vulnerability, is a critical-severity flaw in Microsoft's Netlogon Remote Protocol. This vulnerability, which was patched on August 11, 2020, allows attackers to escalate privileges and gain administrative access to a Windows domain controller without anyExploited
2
Source Document References
Information about the Rhysida Threat Actor was read from the documents corpus below. This display is limited to 20 results, create a free account to see more
PreviewSource LinkCreatedAtTitle
BankInfoSecurity
2 months ago
Recorded Future
2 months ago
BankInfoSecurity
a month ago
Securityaffairs
2 months ago
InfoSecurity-magazine
2 months ago
BankInfoSecurity
2 months ago
Checkpoint
2 months ago
BankInfoSecurity
3 months ago
Securityaffairs
3 months ago
DARKReading
3 months ago
Securityaffairs
3 months ago
BankInfoSecurity
4 months ago
DARKReading
4 months ago
Malwarebytes
4 months ago
InfoSecurity-magazine
4 months ago
Securityaffairs
4 months ago
CERT-EU
a year ago
Securityaffairs
5 months ago
BankInfoSecurity
5 months ago
BankInfoSecurity
6 months ago