#Pysa

2022-11-21

Analyzing #TTP overlap for nine top #ransomware

This originates from analysis of ransomware targeting schools, but most of these families have threatened a range of critical infrastructure & other industries too

Each ransomware covered here has published extortion threats involving a school or university during the past year, and this trend is increasing. I tallied 66 ransomware extortion threats against these #education entities since last October. A few groups dominate (see pie chart), and victim count jumped especially high in recent months for schools (K-12) (see bar chart).

The #malware covered here (and count of associated extortion threats against education entities) are: #ViceSociety (25), #Pysa (8), #LockBit 3.0 (7), #ALPHV / #BlackCat (6), LockBit 2.0 (5), #Hive (4), #BianLian (3), #Quantum, Snatch (2), & #Conti, #REvil, Sabbath, and Stormous (1 each). Also #HelloKitty / #FiveHands, which is used by Vice Society, but no relevant posts were observed.

Visual summary of my analysis: app.tidalcyber.com/share/8d9f2

Overall the nine ransomware map to 131 unique techniques total, sourced from 30 recent public reports, mainly malware analysis & government advisories ("Show only labelled techniques" gives the best view). The underlines & numbers in the cells indicate number of malware mapped to that technique. Background color gradient represents number of sources referencing it. This tool helps with pivoting to defenses and analytics (think Sigma rules), offensive tests (Atomic Red Team), and data sources (make sure you have proper logging enabled) mapped to the same techniques.
#threatintel #SharedWithTidal

2021-11-05

RT @inversecos@twitter.com

1\ Ransomware :

> ZeroLogon Initial Access
> Custom coded Golang RAT
> Exfil using custom coded script to remote IP
> Custom coded reconnaissance scripts
> Decryption key is dodgy

Also..deletes EVERYTHING they create.. including deleting entire user profiles ๐Ÿ˜ตโ€๐Ÿ’ซ

๐Ÿฆ๐Ÿ”—: twitter.com/inversecos/status/

๐Ÿ‘ socatsocat@nanao.cybtex.fr
2021-10-05

Les opรฉrateurs Pysa diffusent des donnรฉes relatives ร  :

  • ๐Ÿ‡บ๐Ÿ‡ธ Ocean View Nursing & Rehabilitation (oceanviewrehab.com)
  • ๐Ÿ‡บ๐Ÿ‡ธ ITS, Inc. (itsdmv.com)
  • ๐Ÿ‡บ๐Ÿ‡ธ Jurysync (jurysync.com)
  • ๐Ÿ‡จ๐Ÿ‡ฆ Adore Fashions (adorefashions.com)
  • ๐Ÿ‡ซ๐Ÿ‡ท Santรฉlys (santelys.asso.fr)
  • ๐Ÿ‡บ๐Ÿ‡ธ Consolidated High School District 230 (d230.org)
  • ๐Ÿ‡ง๐Ÿ‡ท HMCC (hmcc.com.br)
  • ๐Ÿ‡ฎ๐Ÿ‡ช Ardagh Group (ardaghgroup.com)
  • ๐Ÿ‡บ๐Ÿ‡ธ Associated Solutions (associated-solutions.com)
  • ๐Ÿ‡ฌ๐Ÿ‡ง St Benet Biscop (st-benetbiscop.org.uk)
  • ๐Ÿ‡จ๐Ÿ‡ท Instituto Mixto de Ayuda Social (imas.go.cr)

#USA #CANADA #FRANCE #IRELAND #UK #BRAZIL #COSTARICA #RANSOMWARE #PYSA #DATABREACH

2021-01-07

Data stolen from Hackney Council posted on dark web by ransomware gang - The cybercrime gang behind the PYSA ransomware has released files which they claim to have stolen ... grahamcluley.com/data-stolen-f #ransomware #databreach #mespinoza #dataloss #malware #hackney #pysa

Teddy / Domingo (๐Ÿ‡จ๐Ÿ‡ต/๐Ÿ‡ฌ๐Ÿ‡ง)TeddyTheBest@framapiaf.org
2020-03-19

France warns of new ransomware gang targeting local governments. CERT France says some local governments have been infected with a new version of the #Pysa ( #Mespinoza) #ransomware.
zdnet.com/article/france-warns
#malware

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst