Site icon TheCyberThrone

PYSA Ransomware

Advertisements

FBI Cyber Division has issued a alert to warn of an increase in PYSA ransomware attacks targeting government entities, educational institutions, private companies, and the healthcare sector in the US and the UK. The FBI has become aware of PYSA ransomware attacks against the US and foreign government entities, educational institutions, private companies, and the healthcare sector by unidentified cyber actors. PYSA typically gains unauthorized access to victim networks by compromising RDP credentials and through phishing emails.

The hackers responsible for PYSA ransomware attacks are known to encrypt data on compromised systems, steal information from victims, and threaten to leak it in an effort to increase their chances of getting paid.

FBI has been tracking it since March 2020, PYSA, also known as Mespinoza, has been active since at least October 2019. The threat actors are known to use phishing and RDP attacks for initial access to targeted networks, and tools such as “Advanced Port Scanner and Advanced IP Scanner to conduct network reconnaissance, and proceed to install open-source tools, such as PowerShell Empire, Koadic, and Mimikatz”.

After exfiltrating files from the victim’s network,the cybercriminals start encrypting them on Windows or Linux devices. The agency advises organizations not to pay the ransom, as it doesn’t guarantee the recovery of files, but says that it “understands that when victims are faced with an inability to function, all options are evaluated to protect shareholders, employees, and customers.”

Preventing and Blocking PYSA Ransomware

Additionally, the FBI has provided a list of recommended mitigations to help detect and block PYSA ransomware attacks against educational organizations:

Exit mobile version