Inactive ransomware operator
← All groupsPysa
aka Mespinoza, Pyza · 309 victims indexed · first seen 6 years ago · last activity 4 years ago
At a glance
- Status
- inactive
- Aliases
- Mespinoza, Pyza
- First seen
- 6 years ago
- Last activity
- 4 years ago
- Onion sites
- 2 known endpoints
- Primary sector
- Education · 26 hits
About
References
36 linksExternal sources curated by the MISP threat-intel community.
- cert.ssi.gouv.fr/cti/CERTFR-2020-CTI-002/
- cert.ssi.gouv.fr/uploads/CERTFR-2020-CTI-002.pdf
- cert.ssi.gouv.fr/uploads/CERTFR-2020-CTI-003.pdf
- ic3.gov/Media/News/2021/210316.pdf
- blog.malwarebytes.com/threat-spotlight/2021/03/pysa-the-ransomware-attacking-schools
- secureworks.com/research/threat-profiles/gold-burlap
- blog.cyble.com/2021/11/29/pysa-ransomware-under-the-lens-a-deep-dive-analysis/
- blogs.blackberry.com/en/2021/06/pysa-loves-chachi-a-new-golang-rat
- dissectingmalwa.re/another-one-for-the-collection-mespinoza-pysa-ransomware.html
- docs.google.com/spreadsheets/d/1MI8Z2tBhmqQ5X8Wf_ozv3dVjz5sJOs-3
- go.crowdstrike.com/rs/281-OBQ-266/images/Report2021GTR.pdf
- id-ransomware.blogspot.com/2019/10/mespinoza-ransomware.html
- ke-la.com/how-ransomware-gangs-find-new-monetization-schemes-and-evolve-in-marketing/
- media.kasperskycontenthub.com/wp-content/uploads/sites/43/2022/06/23093553/Common-TTPs-of-the-modern-ransomware_low-res.pdf
- public.intel471.com/blog/ransomware-as-a-service-2020-ryuk-maze-revil-egregor-doppelpaymer/
- securelist.com/modern-ransomware-groups-ttps/106824/
- thedfirreport.com/2020/11/23/pysa-mespinoza-ransomware/
- twitter.com/campuscodi/status/1347223969984897026
- twitter.com/inversecos/status/1456486725664993287
- unit42.paloaltonetworks.com/gasket-and-magicsocks-tools-install-mespinoza-ransomware/
Timeline
8 monthsTop countries
Top sectors
MITRE ATT&CK
17 techniques · 10 tacticsTactics
Techniques
- T1078Valid Accounts
- T1190Exploit Public-Facing Application
- T1059.001PowerShell
- T1059.003Windows Command Shell
- T1053.005Scheduled Task
- T1543.003Windows Service
- T1055Process Injection
- T1027Obfuscated Files or Information
- T1562.001Disable or Modify Tools
- T1003.001LSASS Memory
- T1021.001Remote Desktop Protocol
- T1021.002SMB/Windows Admin Shares
- T1083File and Directory Discovery
- T1005Data from Local System
- T1041Exfiltration Over C2 Channel
- T1486Data Encrypted for Impact
- T1489Service Stop
Recent victims
Loading…
Onion infrastructure
2 known- http://pysa2bitc5ldeyfak4seeruqymqs4sj5wt5qkcq7aoyg4h2acqieywad.onion
- http://pysa2bitc5ldeyfak4seeruqymqs4sj5wt5qkcq7aoyg4h2acqieywad.onion/partners.html
Source
Updated 4 years agoData on this page is sourced from the group's own leak posts, cross-checked with public ransomware trackers (RansomLook, ransomware.live, RansomWatch), MITRE ATT&CK, and our own Tor and Telegram crawlers. This is a public observatory page — share freely.
