Human-Operated: PYSA is a human-operated ransomware that does not have self-propagation capabilities. Threat actors manually deploy the PYSA ransomware as part of full attack operations. The PYSA ransomware operators typically gain initial access to target systems by compromising credentials or through phishing emails. Prior to the deployment of the ransomware, the malicious actors use publicly available and/or open-source tools for credential theft, stealthiness, privilege escalation, lateral movement, and more.
Hybrid Encryption Approach: The PYSA ransomware is implemented in the C++ programming language and uses the open-source CryptoPP C++ library for data encryption. The ransomware encrypts data by combining the use of the Advanced Encryption Standard-Cipher Block Chaining (AES-CBC) and the Rivest, Shamir, Adleman (RSA) encryption algorithms. This is to maximize both encryption performance and security.
Double Extortion: The PYSA ransomware operators use a double extortion tactic - if the victim refuses to pay for data decryption, the malicious actor threatens to leak the data or sell it for profit.
Detected and Prevented: The Cybereason Defense Platform effectively detects and prevents the PYSA ransomware.
Cybereason Managed Detection and Response (MDR): The Cybereason GSOC has zero tolerance towards attacks that involve ransomware, such as PYSA, and categorizes such attacks as critical, high-severity incidents. The Cybereason GSOC MDR team issues a comprehensive report to customers when such an incident occurs. The report provides an in-depth overview of the incident, which helps to scope the extent of compromise and the impact on the customer’s environment. In addition, the report provides attribution information when possible as well as recommendations for mitigating and isolating the threat.
Human-Operated:
PYSA
is a human-operated ransomware that does not have self-propagation capabilities. Threat actors
manually
deploy the
PYSA
ransomware as part of full attack operations. The
PYSA
ransomware operators
typically
gain initial access to target systems by compromising credentials or through phishing emails. Prior to the deployment of the ransomware, the malicious actors
use
publicly
available and/or open-source tools for credential theft, stealthiness, privilege escalation, lateral movement, and more.
Hybrid Encryption Approach: The
PYSA
ransomware
is implemented
in the C++ programming language and
uses
the open-source
CryptoPP
C++ library for
data
encryption. The ransomware encrypts
data
by combining the
use
of the Advanced Encryption Standard-Cipher Block Chaining (AES-CBC) and the
Rivest
,
Shamir
,
Adleman
(RSA) encryption algorithms. This is to maximize both encryption performance and security.
Double Extortion: The
PYSA
ransomware operators
use
a double extortion tactic
-
if the victim refuses to pay for
data
decryption, the malicious actor threatens to leak the
data
or sell it for profit.
Detected and
Prevented
: The
Cybereason
Defense Platform
effectively
detects and
prevents
the
PYSA
ransomware.
Cybereason
Managed Detection and Response (MDR): The
Cybereason
GSOC
has zero tolerance towards attacks that involve ransomware, such as
PYSA
, and categorizes such attacks as critical, high-severity incidents. The
Cybereason
GSOC
MDR team issues a comprehensive report to customers when such an incident occurs. The report provides an in-depth overview of the incident, which
helps
to scope the extent of compromise and the impact on the customer’s environment.
In addition
, the report provides attribution information when possible
as well
as recommendations for mitigating and isolating the threat.