Threat Actor Profile
High Cybercriminal
Description

Rhysida is a ransomware-as-a-service (RAAS) group that emerged in May 2023. The group utilizes a namesake ransomware through phishing attacks and Cobalt Strike to breach the targets' networks and deploy their payloads. The group threatens to publicly distribute exfiltrated data if the ransom is not paid, and it's worth mentioning that Rhysida is still in the early stages of development. The ransomware leaves PDF notes in the affected folders, instructing victims to contact the group through its portal, and payment is made via Bitcoin. After encryption, the ransomware appends the extension '.ryshida' to encrypted files. Source: https://github.com/crocodyli/ThreatActors-TTPs

Confidence Score
100%
Tags
ransomware ransomware.live
First Seen

Unknown

Last Updated

Unknown

Active Status
Active
Created

April 29, 2026

MITRE ATT&CK Techniques (28)
T1005 - Data from Local System
Collection
T1119 - Automated Collection
Collection
T1071 - Application Layer Protocol
Command and Control
T1071.001 - Web Protocols
Command and Control
T1027 - Obfuscated Files or Information
Defense Evasion
T1036 - Masquerading
Defense Evasion
T1055 - Process Injection
Defense Evasion
T1055.003 - Thread Execution Hijacking
Defense Evasion
T1497 - Virtualization/Sandbox Evasion
Defense Evasion
T1564 - Hide Artifacts
Defense Evasion
T1564.004 - NTFS File Attributes
Defense Evasion
T1620 - Reflective Code Loading
Defense Evasion
T1010 - Application Window Discovery
Discovery
T1057 - Process Discovery
Discovery
T1082 - System Information Discovery
Discovery
T1083 - File and Directory Discovery
Discovery
T1518.001 - Security Software Discovery
Discovery
T1059 - Command and Scripting Interpreter
Execution
T1129 - Shared Modules
Execution
T1041 - Exfiltration Over C2 Channel
Exfiltration
T1486 - Data Encrypted for Impact
Impact
T1566 - Phishing
Initial Access
T1547.001 - Registry Run Keys / Startup Folder
Persistence
T1548.002 - Bypass User Account Control
Privilege Escalation
T1595 - Active Scanning
Reconnaissance
T1598 - Phishing for Information
Reconnaissance
T1583 - Acquire Infrastructure
Resource Development
T1587 - Develop Capabilities
Resource Development
Indicators of Compromise

Loading IOCs…

IOC KQL for Sentinel
STIX Data
{'added_date': None,
 'client': '2003264@sit.singaporetech.edu.sg',
 'description': 'Rhysida is a ransomware-as-a-service (RAAS) group that '
                'emerged in May 2023. The group utilizes a namesake ransomware '
                'through phishing attacks and Cobalt Strike to breach the '
                "targets' networks and deploy their payloads.<br> <br> The "
                'group threatens to publicly distribute exfiltrated data if '
                "the ransom is not paid, and it's worth mentioning that "
                'Rhysida is still in the early stages of development.<br> <br> '
                'The ransomware leaves PDF notes in the affected folders, '
                'instructing victims to contact the group through its portal, '
                'and payment is made via Bitcoin.<br> <br> After encryption, '
                "the ransomware appends the extension '.ryshida' to encrypted "
                'files.<BR>Source: '
                'https://github.com/crocodyli/ThreatActors-TTPs',
 'firstseen': '2023-06-05T11:25:22.945172+00:00',
 'group': 'rhysida',
 'has_negotiations': False,
 'has_ransomnote': True,
 'lastseen': '2026-04-27T15:35:49.961778+00:00',
 'locations': [{'available': True,
                'fqdn': 'rhysidafohrhyy2aszi7bm32tnjat5xri65fopcxkdfxhi4tidsg7cad.onion',
                'slug': 'http://rhysidafohrhyy2aszi7bm32tnjat5xri65fopcxkdfxhi4tidsg7cad.onion/archive.php?auction',
                'title': '',
                'type': 'DLS'},
               {'available': True,
                'fqdn': 'rhysidafc6lm7qa2mkiukbezh7zuth3i4wof4mh2audkymscjm6yegad.onion',
                'slug': 'http://rhysidafc6lm7qa2mkiukbezh7zuth3i4wof4mh2audkymscjm6yegad.onion',
                'title': 'Rhysida',
                'type': 'DLS'}],
 'negotiation_count': 0,
 'ransomnotes_count': 1,
 'tiaras_metadata': {'has_negotiations': False,
                     'has_ransomnote': True,
                     'locations': [{'available': True,
                                    'fqdn': 'rhysidafohrhyy2aszi7bm32tnjat5xri65fopcxkdfxhi4tidsg7cad.onion',
                                    'slug': 'http://rhysidafohrhyy2aszi7bm32tnjat5xri65fopcxkdfxhi4tidsg7cad.onion/archive.php?auction',
                                    'title': '',
                                    'type': 'DLS'},
                                   {'available': True,
                                    'fqdn': 'rhysidafc6lm7qa2mkiukbezh7zuth3i4wof4mh2audkymscjm6yegad.onion',
                                    'slug': 'http://rhysidafc6lm7qa2mkiukbezh7zuth3i4wof4mh2audkymscjm6yegad.onion',
                                    'title': 'Rhysida',
                                    'type': 'DLS'}],
                     'negotiation_count': 0,
                     'ransomnotes_count': 1,
                     'ransomware_live_group': 'rhysida',
                     'tools': {'CredentialTheft': [],
                               'DefenseEvasion': [],
                               'DiscoveryEnum': ['PowerView'],
                               'Exfiltration': ['WinSCP'],
                               'LOLBAS': ['NTDS Utility (ntdsutil)',
                                          'PsExec',
                                          'Windows Event Utility (wevtutil)',
                                          'WMIC'],
                               'Networking': [],
                               'Offsec': ['Impacket'],
                               'RMM-Tools': ['AnyDesk']},
                     'url': 'https://www.ransomware.live/group/rhysida',
                     'victims': 269,
                     'vulnerabilities': []},
 'tiaras_source': 'ransomware.live',
 'tools': {'CredentialTheft': [],
           'DefenseEvasion': [],
           'DiscoveryEnum': ['PowerView'],
           'Exfiltration': ['WinSCP'],
           'LOLBAS': ['NTDS Utility (ntdsutil)',
                      'PsExec',
                      'Windows Event Utility (wevtutil)',
                      'WMIC'],
           'Networking': [],
           'Offsec': ['Impacket'],
           'RMM-Tools': ['AnyDesk']},
 'ttps': [{'tactic_id': 'TA0043',
           'tactic_name': 'Reconnaissance',
           'techniques': [{'technique_details': 'Scanning for vulnerable '
                                                'targets.',
                           'technique_id': 'T1595',
                           'technique_name': 'Active Scanning'},
                          {'technique_details': 'Gathering information through '
                                                'phishing.',
                           'technique_id': 'T1598',
                           'technique_name': 'Phishing for Information'}]},
          {'tactic_id': 'TA0042',
           'tactic_name': 'Resource Development',
           'techniques': [{'technique_details': 'Acquiring infrastructure for '
                                                'operations.',
                           'technique_id': 'T1583',
                           'technique_name': 'Acquire Infrastructure'},
                          {'technique_details': 'Developing malware '
                                                'capabilities.',
                           'technique_id': 'T1587',
                           'technique_name': 'Develop Capabilities'}]},
          {'tactic_id': 'TA0001',
           'tactic_name': 'Initial Access',
           'techniques': [{'technique_details': 'Phishing for initial access.',
                           'technique_id': 'T1566',
                           'technique_name': 'Phishing'},
                          {'technique_details': 'Bypassing UAC for access.',
                           'technique_id': 'T1548.002',
                           'technique_name': 'Abusing Elevation Control '
                                             'Mechanism: Bypass User Account '
                                             'Control'}]},
          {'tactic_id': 'TA0002',
           'tactic_name': 'Execution',
           'techniques': [{'technique_details': 'Using command interpreters '
                                                'for execution.',
                           'technique_id': 'T1059',
                           'technique_name': 'Command and Scripting '
                                             'Interpreter'},
                          {'technique_details': 'Using shared modules.',
                           'technique_id': 'T1129',
                           'technique_name': 'Shared Modules'}]},
          {'tactic_id': 'TA0003',
           'tactic_name': 'Persistence',
           'techniques': [{'technique_details': 'Persistence via registry run '
                                                'keys.',
                           'technique_id': 'T1547.001',
                           'technique_name': 'Registry Run Keys / Startup '
                                             'Folder'}]},
          {'tactic_id': 'TA0004',
           'tactic_name': 'Privilege Escalation',
           'techniques': [{'technique_details': 'Injecting into processes for '
                                                'privilege escalation.',
                           'technique_id': 'T1055',
                           'technique_name': 'Process Injection'},
                          {'technique_details': 'Hijacking thread execution.',
                           'technique_id': 'T1055.003',
                           'technique_name': 'Thread Execution Hijacking'},
                          {'technique_details': 'Using registry run keys.',
                           'technique_id': 'T1547.001',
                           'technique_name': 'Registry Run Keys'}]},
          {'tactic_id': 'TA0005',
           'tactic_name': 'Defense Evasion',
           'techniques': [{'technique_details': 'Obfuscating files and '
                                                'information.',
                           'technique_id': 'T1027',
                           'technique_name': 'Obfuscated Files or Information'},
                          {'technique_details': 'Masquerading malicious files.',
                           'technique_id': 'T1036',
                           'technique_name': 'Masquerading'},
                          {'technique_details': 'Process injection for '
                                                'evasion.',
                           'technique_id': 'T1055',
                           'technique_name': 'Process Injection'},
                          {'technique_details': 'Thread execution hijacking.',
                           'technique_id': 'T1055.003',
                           'technique_name': 'Thread Execution Hijacking'},
                          {'technique_details': 'Evading '
                                                'virtualization/sandbox '
                                                'detection.',
                           'technique_id': 'T1497',
                           'technique_name': 'Virtualization/Sandbox Evasion'},
                          {'technique_details': 'Hiding artifacts.',
                           'technique_id': 'T1564',
                           'technique_name': 'Hidden Artifacts'},
                          {'technique_details': 'Using NTFS file attributes.',
                           'technique_id': 'T1564.004',
                           'technique_name': 'NTFS File Attributes'},
                          {'technique_details': 'Reflective DLL injection.',
                           'technique_id': 'T1620',
                           'technique_name': 'Reflective DLL Injection'}]},
          {'tactic_id': 'TA0007',
           'tactic_name': 'Discovery',
           'techniques': [{'technique_details': 'Discovering application '
                                                'windows.',
                           'technique_id': 'T1010',
                           'technique_name': 'Application Window Discovery'},
                          {'technique_details': 'Discovering running '
                                                'processes.',
                           'technique_id': 'T1057',
                           'technique_name': 'Process Discovery'},
                          {'technique_details': 'Discovering system '
                                                'information.',
                           'technique_id': 'T1082',
                           'technique_name': 'System Information Discovery'},
                          {'technique_details': 'Discovering files and '
                                                'directories.',
                           'technique_id': 'T1083',
                           'technique_name': 'File and Directory Discovery'},
                          {'technique_details': 'Detecting '
                                                'virtualization/sandbox.',
                           'technique_id': 'T1497',
                           'technique_name': 'Virtualization/Sandbox Evasion'},
                          {'technique_details': 'Discovering security '
                                                'software.',
                           'technique_id': 'T1518.001',
                           'technique_name': 'Security Software Discovery'}]},
          {'tactic_id': 'TA0009',
           'tactic_name': 'Collection',
           'techniques': [{'technique_details': 'Collecting data from local '
                                                'system.',
                           'technique_id': 'T1005',
                           'technique_name': 'Data from Local System'},
                          {'technique_details': 'Automated data collection.',
                           'technique_id': 'T1119',
                           'technique_name': 'Automated Collection'}]},
          {'tactic_id': 'TA0011',
           'tactic_name': 'Command and Control',
           'techniques': [{'technique_details': 'Using application layer '
                                                'protocols.',
                           'technique_id': 'T1071',
                           'technique_name': 'Application Layer Protocol'},
                          {'technique_details': 'Using web protocols for C2.',
                           'technique_id': 'T1071.001',
                           'technique_name': 'Web Protocols'}]},
          {'tactic_id': 'TA0010',
           'tactic_name': 'Exfiltration',
           'techniques': [{'technique_details': 'Exfiltrating data over C2 '
                                                'channel.',
                           'technique_id': 'T1041',
                           'technique_name': 'Exfiltration Over C2 Channel'}]},
          {'tactic_id': 'TA0040',
           'tactic_name': 'Impact',
           'techniques': [{'technique_details': 'Encrypting data for impact.',
                           'technique_id': 'T1486',
                           'technique_name': 'Data Encrypted for Impact'}]}],
 'url': 'https://www.ransomware.live/group/rhysida',
 'victims': 269,
 'vulnerabilities': []}
Quick Actions
Related TTPs (28)
Data from Local System
Collection

Automated Collection
Collection

Application Layer Protocol
Command and Control

Web Protocols
Command and Control

Obfuscated Files or Informati…
Defense Evasion