Active ransomware operator
← All groupsRhysida
278 victims indexed · first seen 3 years ago · last activity 23 hours ago
At a glance
- Status
- active
- First seen
- 3 years ago
- Last activity
- 23 hours ago
- Onion sites
- 5 known endpoints
- Primary sector
- Healthcare · 42 hits
About
References
3 linksExternal sources curated by the MISP threat-intel community.
Timeline
24 monthsTop countries
Top sectors
MITRE ATT&CK
11 techniques · 10 tacticsTactics
Techniques
- T1566Phishing
- T1190Exploit Public-Facing Application
- T1059Command and Scripting Interpreter
- T1543Create or Modify System Process
- T1055Process Injection
- T1027Obfuscated Files or Information
- T1003OS Credential Dumping
- T1021Remote Services
- T1005Data from Local System
- T1041Exfiltration Over C2 Channel
- T1486Data Encrypted for Impact
Detection · YARA rules
1 ruleRhysida_Ransomware
Detects Rhysida ransomware
source: CISA AA23-319A
Recent victims
Loading…
Onion infrastructure
5 known- http://rhysidafc6lm7qa2mkiukbezh7zuth3i4wof4mh2audkymscjm6yegad.onion
- http://rhysidafc6lm7qa2mkiukbezh7zuth3i4wof4mh2audkymscjm6yegad.onion/
- http://rhysidafc6lm7qa2mkiukbezh7zuth3i4wof4mh2audkymscjm6yegad.onion/archive.php?last&auction
- http://rhysidafohrhyy2aszi7bm32tnjat5xri65fopcxkdfxhi4tidsg7cad.onion
- http://rhysidafohrhyy2aszi7bm32tnjat5xri65fopcxkdfxhi4tidsg7cad.onion/archive.php
Source
Updated 23 hours agoData on this page is sourced from the group's own leak posts, cross-checked with public ransomware trackers (RansomLook, ransomware.live, RansomWatch), MITRE ATT&CK, and our own Tor and Telegram crawlers. This is a public observatory page — share freely.
