Context over chaos. Disconnected technologies, siloed data, and reactive processes can only get you so far. Protecting businesses in today’s threat landscape demands more than a set of security tools – it requires context.
That's where Avertium comes in
Security. It’s in our DNA. It’s elemental, foundational. Something that an always-on, everything’s-IoT-connected world depends on.
Helping mid-to-enterprise organizations protect assets and manage risk is our only business. Our mission is to make our customers’ world a safer place so that they may thrive in an always-on, connected world.
Best-in-class technology from our partners... backed by service excellence from Avertium.
Interested in becoming a partner?
With Avertium's deal registration, partners can efficiently and confidently connect with Avertium on opportunities to protect your deals.
Microsoft Copilot for Security analyzes and synthesizes high volumes of security data which can help healthcare cybersecurity teams do more with less.
Dive into our resource hub and explore top
cybersecurity topics along with what we do
and what we can do for you.
Lately, Rhysida ransomware has become a serious and mysterious threat to education and other sectors. Since it first appeared in May of this year, it has been connected to some major cyberattacks, including one on the Chilean Army.
Also, the group expanded its operations to target important healthcare organizations, like the attack on Prospect Medical Holdings, which affected a large network of 17 hospitals and 166 clinics in the U.S. As a result, the U.S. Department of Health and Human Services recognized Rhysida as a significant threat to the sector. Let’s explore the tactics and techniques used by Rhysida and focus on ways to detect, prevent, and respond to the group’s attacks.
Rhysida ransomware came to public attention in May 2023. The group has been associated with several significant breaches, including an attack on the Chilean Army where they leaked stolen documents on their data leak site. The threat actor was also linked to an attack on Prospect Medical Holdings, impacting 17 hospitals and 166 clinics across the U.S. Following this attack, the U.S. Department of Health and Human Services (HC3) classified Rhysida as a substantial threat to the healthcare sector.
Rhysida presents itself as a "cybersecurity team" with the goal of assisting victims in identifying potential security issues and fortifying their network defenses. Despite limited knowledge about the group's origins or national affiliations, the group adopts the name Rhysida, drawing inspiration from the Rhysida genus of centipedes, which is also symbolized in their victim blog's logo. Their TOR page showcases ongoing auctions and provides an overview of their total number of victims. Additionally, the group's website functions as a hub for Rhysida-related news and media coverage. The site also has instructions on how journalists, recovery agencies, or even fans can get in touch with the group.
Image 1: Rhysida Logo
Source: SentinelOne.com
The researchers at Check Point analyzed Rhysida ransomware and found striking parallels between the Tactics, Techniques, and Procedures (TTPs) of Rhysida and those of another ransomware group, Vice Society. Vice Society has been one of the most active and aggressive ransomware groups since 2021, predominantly targeting the education and healthcare sectors.
If you recall, Vice Society was responsible for the attack on the Los Angeles Unified School District. Check Point’s analysis reveals both technical similarities between the two groups and a clear correlation between the emergence of Rhysida and the decline of Vice Society. Additionally, both groups share a focus on two prominent sectors within the ransomware landscape: education and healthcare.
It's worth noting that the involvement of Vice Society does not imply that Rhysida is exclusively used by them but indicates that the operators of Vice Society have now adopted the Rhysida ransomware. In addition to technical similarities, a notable link emerges when examining the timeline of extortion announcements by Rhysida and Vice Society. Rhysida's emergence corresponds with a sharp decline in Vice Society's activity.
The are several TTPs that Check Point and other researchers have observed being used by Rhysida:
According to Check Point and SentinelOne, Rhysida typically gains access to a victim's system through phishing tactics, followed by the use of Cobalt Strike for lateral movement within the system. Additionally, the threat actors use PsExec to deploy both PowerShell scripts and the Rhysida ransomware payload. The PowerShell script, known as g.ps1 and identified as Trojan.PS1.SILENTKILL.A, serves various purposes for the threat actors, including terminating antivirus processes and services, erasing shadow copies, altering remote desktop protocol (RDP) configurations, and modifying the active directory (AD) password.
Notably, during the execution of the script (g.ps1), it appears that the threat actors updated it, ultimately leading to a PowerShell version of Rhysida ransomware. Rhysida uses a 4096-bit RSA key and AES-CTR for file encryption. After successfully encrypting files, it appends the .rhysida extension to them and deposits a ransom note named CriticalBreachDetected.pdf.
This ransom note has a unique characteristic. Instead of a typical ransom demand, as seen in most ransom notes, the Rhysida ransom note takes the form of an alert from the Rhysida "cybersecurity team," informing victims of a compromise to their system and file encryption. The ransom demand is presented as a requirement to obtain a "unique key" for file restoration, which the victim is expected to pay for.
Trend Micro's analysis reveals that Rhysida's encryption process can be summarized as follows:
Image 2: Rhysida's Encryption Function
Source: Trend Micro
Examination of Rhysida ransomware samples indicates that the group is in the early stages of its development cycle. These payloads lack many common features typically found in contemporary ransomware, such as the removal of Volume Shadow Copies (VSS). However, the group follows the contemporary trend of multi-extortion by threatening victims with the public release of exfiltrated data.
Upon execution, Rhysida initiates a cmd.exe window, scanning all files across local drives. Victims are directed to contact the attackers via a TOR-based portal, using a unique identifier provided in the ransom notes. Rhysida exclusively accepts Bitcoin (BTC) payments and gives victims guidance on how to get and use BTC via the victim portal. Additionally, victims are prompted to provide further information for authentication and contact purposes.
Rhysida ransom notes are delivered as PDF documents to affected directories on the targeted drives. The ransomware attempts to modify the desktop background through multiple commands, although this feature seems to be non-functional and unreliable in currently examined samples. Rhysida payloads make use of the ChaCha20 algorithm for file encryption, hinting at potential support for other algorithms in the future, though ChaCha20 is presently the sole fully implemented option.
On August 4, 2023, the Health Sector Cybersecurity Coordination Center (HC3) of the U.S. Department of Health and Human Services (HHS) issued a security alert regarding Rhysida (also identified as Ransom.PS1.RHYSIDA.SM).
According to the HC3 alert, Rhysida was previously known for targeting the education, government, manufacturing, and technology sectors, but expanded its attacks to include healthcare and public health organizations. The healthcare industry has witnessed a growing number of ransomware incidents over the past half-decade and Rhysida’s attack on Prospect Medical Holdings, a healthcare system in California, was devastating.
The attack disrupted the healthcare organization’s computer systems, forcing some emergency rooms to cease operations and ambulances to be diverted. Although Prospect Medical Holdings is based out of California, they have facilities across several states including Connecticut, Texas, Rhone Island, and Pennsylvania.
According to Trend Micro, Rhysida's operators have shifted their focus from a single industry to multiple sectors from May to August 2023. The threat actor has also extended its reach globally, with Rhysida binaries detected in various countries, including Indonesia, Germany, and the U.S.
Detecting Rhysida ransomware requires a combination of technical and operational measures aimed to recognize and flag potentially malicious activities within the network. This approach allows organizations to respond appropriately, preventing or mitigating the impact of a Rhysida ransomware attack.
To identify Rhysida ransomware, admins should adopt a multi-faceted strategy, including the following steps:
Ultimately, fending off Rhysida ransomware involves following the same core principles as defending against any other ransomware group. Time-tested security practices that are effective against ransomware threats in general are equally vital for protecting organizations from ransomware groups like Rhysida.
SHA1
MD5
SHA256
Initial Access
Execution
Persistence
Defense Evasion
Discovery
Lateral Movement
Impact
It’s important to get ahead of the curve by being proactive with protecting your organization, instead of waiting to put out a massive fire. Avertium can provide the following services to help keep your organization safe from Rhysida ransomware:
Meet Rhysida, a New Ransomware Strain That Deletes Itself (darkreading.com)
Rhysida Ransomware Explained: Tactics, Techniques, and Procedures (picussecurity.com)
Rhysida ransomware claims recent attack on Prospect Medical, leaks stolen data (axios.com)
An Overview of the New Rhysida Ransomware (trendmicro.com)
The Rhysida Ransomware: Activity Analysis and Ties to Vice Society - Check Point Research
Rhysida Ransomware (trellix.com)
202308041500_Rhysida Ransomware Sector Alert_TLPCLEAR (hhs.gov)
An In-Depth Look at Vice Society Ransomware (avertium.com)
Rhysida ransomware behind recent attacks on healthcare (bleepingcomputer.com)
A cyberattack has disrupted hospitals and health care in several states | AP News
Cyberattack hits hospitals across three states (axios.com)
Rhysida Ransomware Explained: Tactics, Techniques, and Procedures (picussecurity.com)
This document and its contents do not constitute, and are not a substitute for, legal advice. The outcome of a Security Risk Assessment should be utilized to ensure that diligent measures are taken to lower the risk of potential weaknesses be exploited to compromise data.
Although the Services and this report may provide data that Client can use in its compliance efforts, Client (not Avertium) is ultimately responsible for assessing and meeting Client's own compliance responsibilities. This report does not constitute a guarantee or assurance of Client's compliance with any law, regulation or standard.