{"id":20963,"date":"2024-06-03T11:58:51","date_gmt":"2024-06-03T18:58:51","guid":{"rendered":"https:\/\/webdev.securin.xyz\/?p=20963"},"modified":"2024-06-03T11:58:51","modified_gmt":"2024-06-03T18:58:51","slug":"all-about-rhysida-ransomware","status":"publish","type":"post","link":"https:\/\/webdev.securin.xyz\/ransomware\/all-about-rhysida-ransomware\/","title":{"rendered":"All About Rhysida Ransomware"},"content":{"rendered":"\t\t
Rhysida ransomware emerged in May 2023 when it began targeting the education sector, critical manufacturing, tech industries and the government. They became more widely known in August 2023, after a series of attacks on healthcare and public health organizations. The Health Sector Cybersecurity Coordination Centre (HC3) put out an <\/span>advisory<\/span><\/a> about the new ransomware threat. By the end of January 2024, the group had listed 150+ victims spread across 25 countries. <\/span><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t Though Rhysida ransomware leverages tactics, techniques and procedures (TTPs) that are eerily similar to Vice Society, there is still not enough proof to declare Rhysida ransomware as a rebrand of Vice Society ransomware. Ongoing monitoring and collaboration from the cybersecurity community can help to build a more complete picture of the Rhysida ransomware.<\/span><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t Rhysida ransomware threat actors have been known to use legitimate software to infiltrate and compromise target networks.\u00a0<\/span><\/p> Rhysida ransomware has had a global impact, with a large concentration of incidents in North America, primarily in the USA, and a smattering of attacks in Asia, Australia, Europe and South America. The sectors most heavily targeted by Rhysida ransomware have been the Education sector, with 13 identified targets, the Critical Infrastructure and Manufacturing sector, with 9 targets, and the IT, Communications & Mass Media sector, with 7 targets.<\/span><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t The heat map provides an insight into the workings of the ransomware group and which sectors must remain vigilant towards possible cyber incursions and therefore consolidate their weak network endpoints. <\/span><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t By analyzing this data, businesses can prioritize their cybersecurity efforts and focus on shoring up the weaknesses in their network endpoints to better defend against potential attacks. This insight enables proactive measures to be taken, such as implementing robust security measures, conducting thorough vulnerability assessments, and enhancing overall resilience to mitigate the impact of possible ransomware attacks.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t Rhysida ransomware typically spreads through malicious email attachments or downloads from compromised websites. Once it infects a system, it encrypts files and demands a ransom in exchange for the decryption key.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\tRhysida Ransomware: Vice Society Rebranded?\n<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
Rhysida Ransomware: Attack Vectors<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
The vulnerability that was most often leveraged by Rhysida ransomware to gain access to target networks was a four-year-old flaw privilege escalation flaw in Microsoft\u2019s Netlogon Remote Protocol, popularly referred to as \u2018ZeroLogon\u2019 (CVE-2020-1472<\/a>) and was <\/span>called out by Securin<\/span><\/a> experts as far back as 2022, and by CISA in their KEV catalog in November 2021. The patch for the vulnerability was released in August 2020.<\/span><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\tRhysida Ransomware: Victim Patterns and Sectors Targeted<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
Rhysida Ransomware: Attack Methodology<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
Rhysida Ransomware: MITRE Mapping<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t