{"id":20963,"date":"2024-06-03T11:58:51","date_gmt":"2024-06-03T18:58:51","guid":{"rendered":"https:\/\/webdev.securin.xyz\/?p=20963"},"modified":"2024-06-03T11:58:51","modified_gmt":"2024-06-03T18:58:51","slug":"all-about-rhysida-ransomware","status":"publish","type":"post","link":"https:\/\/webdev.securin.xyz\/ransomware\/all-about-rhysida-ransomware\/","title":{"rendered":"All About Rhysida Ransomware"},"content":{"rendered":"\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t

Rhysida ransomware emerged in May 2023 when it began targeting the education sector, critical manufacturing, tech industries and the government. They became more widely known in August 2023, after a series of attacks on healthcare and public health organizations. The Health Sector Cybersecurity Coordination Centre (HC3) put out an <\/span>advisory<\/span><\/a> about the new ransomware threat. By the end of January 2024, the group had listed 150+ victims spread across 25 countries. <\/span><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t

\n\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
<\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
\n\t\t\t\t
\n\t\t\t

Rhysida Ransomware: Vice Society Rebranded?\n<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t

Though Rhysida ransomware leverages tactics, techniques and procedures (TTPs) that are eerily similar to Vice Society, there is still not enough proof to declare Rhysida ransomware as a rebrand of Vice Society ransomware. Ongoing monitoring and collaboration from the cybersecurity community can help to build a more complete picture of the Rhysida ransomware.<\/span><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t

\n\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
<\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
\n\t\t\t\t
\n\t\t\t

Rhysida Ransomware: Attack Vectors<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t

Rhysida ransomware threat actors have been known to use legitimate software to infiltrate and compromise target networks.\u00a0<\/span><\/p>