icon

Digital safety starts here for both commercial and personal Use...

Defend Your Business Against the Latest WNY Cyber Threats We offer Safe, Secure and Affordable Solutions for your Business and Personal Networks and Devices.



WNYCyber is there to help you to choose the best service providers in Western New York... We DO NOT provide the services ourselves, as we are Internet Programmers who have to deak daily with Cyber Threats... (Ugghhh)... So we know what it's like and what it takes to protect OUR and OUR CUSTOMERS DATA... We built this Website to help steer you to those that can give you the best service at realistic and non-inflated prices. We do charge or collect any fees.

#StopRansomware: Rhysida Ransomware

Cyber Security Threat Summary:
A new joint advisory from CISA and the FBI has been issued detailing observed TTPs and IOCs to help organizations protect against Rhysida Ransomware. Rhysida is a fairly new ransomware that was first detected in May 2023. Like any other ransomware gang, the group engages in double extortion schemes where it will encrypt and exfiltrate victims’ files, threatening to publish the data online unless a ransom is paid. According to CISA and the FBI, Rhysida ransomware actors are very opportunistic and target victims residing in the education, healthcare, manufacturing, information technology, and government sectors. Based on open-source reporting, this group shares similarities with another ransomware gang dubbed Vice Society, which employs similar targeting patterns

Security Officer Comments:
The agencies note that this group leverages external-facing remote services, authenticating to internal access points using valid credentials and exploiting known vulnerabilities like Zerologon (CVE-2020-1472) to gain initial access to victim environments. Once initial access is obtained, the group relies on living off-the-land techniques such as RDP to conduct lateral movement and compromise as many systems as possible. To combat potential Rhysida attacks, organizations have been recommended to prioritize patching known exploited vulnerabilities, enable MFA protections for all services, and segment networks to limit the potential impact.

Link(s):
https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-319a