Heimdal
article featured image

Contents:

Today, the FBI and the Cybersecurity and Infrastructure Security Agency (CISA) have jointly issued a warning about the Rhysida ransomware group.

This gang has been attacking various organizations in different sectors since May 2023. A detailed Cybersecurity Advisory (CSA) has been released as part of the #StopRansomware initiative, highlighting the group’s methods and the risks they pose.

Details of the Rhysida Ransomware Operations

The advisory details the tactics, techniques, and procedures (TTPs), along with indicators of compromise (IOCs), identified in investigations up to September 2023. Rhysida, known for targeting various industries like education, healthcare, and government, has already victimized at least 62 companies, explains Security Affairs.

Their approach is described as opportunistic, often leveraging ransomware-as-a-service (RaaS) models.

Threat actors leveraging Rhysida ransomware are known to impact “targets of opportunity,” including victims in the education, healthcare, manufacturing, information technology, and government sectors.

Open-source reporting details similarities between Vice Society (DEV-0832) activity and the actors observed deploying Rhysida ransomware.

Additionally, open-source reporting has confirmed observed instances of Rhysida actors operating in a ransomware-as-a-service (RaaS) capacity, where ransomware tools and infrastructure are leased out in a profit-sharing model. Any ransoms paid are then split between the group and the affiliates.

Joint Cybersecurity Advisory (CSA) (Source)

Technical Insights into the Rhysida Group’s Strategies

Rhysida ransomware attackers use external remote services, such as VPNs and RDPs, for initial access and persistence in target networks.

They exploit vulnerabilities like Zerologon (CVE-2020-1472) in Microsoft’s Netlogon Remote Protocol and use living-off-the-land techniques with built-in network administration tools for their malicious activities.

The following is a list of the tools that the group uses for its activities:

Name


Description


cmd.exe


The native command line prompt utility.


PowerShell.exe


A native command line tool used to start a Windows PowerShell session in a Command Prompt window.


PsExec.exe


A tool included in the PsTools suite used to execute processes remotely. Rhysida actors heavily leveraged this tool for lateral movement and remote execution.


mstsc.exe


A native tool that establishes an RDP connection to a host.


PuTTY.exe


Rhysida actors have been observed creating Secure Shell (SSH) PuTTy connections for lateral movement. In one example, analysis of PowerShell console host history for a compromised user account revealed Rhysida actors leveraged PuTTy to remotely connect to systems via SSH [T1021.004].


PortStarter


A back door script written in Go that provides functionality for modifying firewall settings and opening ports to pre-configured command and control (C2) servers.[1]


secretsdump


A script used to extract credentials and other confidential information from a system. Rhysida actors have been observed using this for NTDS dumping [T1003.003] in various instances.


ntdsutil.exe


A standard Windows tool used to interact with the NTDS database. Rhysida actors used this tool to extract and dump the NTDS.dit database from the domain controller containing hashes for all Active Directory (AD) users.


Note: It is strongly recommended that organizations conduct domain-wide password resets and double Kerberos TGT password resets if any indication is found that the NTDS.dit file was compromised.


AnyDesk


A common software that can be maliciously used by threat actors to obtain remote access and maintain persistence [T1219]. AnyDesk also supports remote file transfer.


wevtutil.exe


A standard Windows Event Utility tool used to view event logs. Rhysida actors used this tool to clear a significant number of Windows event logs, including system, application, and security logs [T1070.001].


PowerView


A PowerShell tool used to gain situational awareness of Windows domains. Review of PowerShell event logs identified Rhysida actors using this tool to conduct additional reconnaissance-based commands and harvest credentials.


Malicious Executables Affiliated with Rhysida Infections:

File NameHash (SHA256)Description
conhost.exe6633fa85bb234a75927b23417313e51a4c155e12f71da3959e168851a600b010A ransomware binary.
psexec.exe078163d5c16f64caa5a14784323fd51451b8c831c73396b967b4e35e6879937bA file used to execute a process on a remote or local host.
S_0.bat1c4978cd5d750a2985da9b58db137fc74d28422f1e087fd77642faa7efe7b597A batch script likely used to place 1.ps1 on victim systems for ransomware staging purposes [T1059.003].
1.ps14e34b9442f825a16d7f6557193426ae7a18899ed46d3b896f6e4357367276183Identifies an extension block list of files to encrypt and not encrypt.
S_1.bat97766464d0f2f91b82b557ac656ab82e15cae7896b1d8c98632ca53c15cf06c4A batch script that copies conhost.exe (the encryption binary) on an imported list of host names within the C:\Windows\Temp directory of each system.
S_2.bat918784e25bd24192ce4e999538be96898558660659e3c624a5f27857784cd7e1Executes conhost.exe on compromised victim systems, which encrypts and appends the extension of .Rhysida across the environment.

C2 IP Addresses Used for Rhysida Operations:

C2 IP Address
5.39.222[.]67
5.255.99[.]59
51.77.102[.]106
108.62.118[.]136
108.62.141[.]161
146.70.104[.]249
156.96.62[.]58
157.154.194[.]6

For email addresses, files, MITRE ATT&CK tactics and techniques and more consult the complete advisory here.

If you liked this piece, follow us on LinkedInTwitterFacebook, and YouTube for more cybersecurity news and topics.

Author Profile

Madalina Popovici

Digital PR Specialist

linkedin icon

Madalina, a seasoned digital content creator at Heimdal®, blends her passion for cybersecurity with an 8-year background in PR & CSR consultancy. Skilled in making complex cyber topics accessible, she bridges the gap between cyber experts and the wider audience with finesse.

Leave a Reply

Your email address will not be published. Required fields are marked *

CHECK OUR SUITE OF 11 CYBERSECURITY SOLUTIONS

SEE MORE