Skip to main content
DFIRLab
Research
Intel BriefingsThreat Actors
File AnalyzerPhishing CheckDomain LookupExposure ScannerPrivacy Check
About
PlatformNew
DFIRLab
Privacy Policy/RSS Feed/Sitemap

Security research, threat intelligence, and detection engineering.

© 2026 DFIR Lab. All rights reserved.

All Threat Actors

Rhysida

Also known as: Rhysida Ransomware, Vice Society (suspected connection)

ActiveIntermediateUnknown (likely Eastern Europe or Russia-nexus)

Profile generated with AI assistance — review before citing.

0Campaigns
24Techniques
6IOCs
9Tools
0Matches
1Infrastructure
OverviewTechniquesToolsIOCsInfrastructureReferences

Overview

Rhysida is a ransomware-as-a-service (RaaS) operation that emerged in May 2023, quickly establishing itself as a significant threat to organizations worldwide. The group operates a double extortion model, encrypting victim data while simultaneously exfiltrating sensitive information to leverage for ransom payments. Rhysida has demonstrated a particular focus on critical infrastructure sectors, including healthcare, education, government organizations, and manufacturing. The group maintains an active data leak site on the dark web where they auction stolen data from victims who refuse to pay ransoms, typically setting 7-day auction periods. Rhysida has been linked to several high-profile attacks, including the British Library breach in October 2023, attacks on multiple healthcare organizations across the United States, the Chilean Army in 2023, and Prospect Medical Holdings affecting multiple hospitals. Rhysida's ransomware is written in C++ and uses ChaCha20 for file encryption combined with RSA-4096 for key encryption. The group typically gains initial access through exploiting known vulnerabilities in public-facing applications (particularly VPN and remote access services), phishing campaigns, and purchasing access from initial access brokers. Their operations show tactical overlaps with Vice Society, leading some researchers to suspect potential connections, shared tooling, or rebranded operations between the groups. The ransomware appends the .rhysida extension to encrypted files and drops a PDF ransom note named CriticalBreachDetected.pdf.

Motivations

Financial gainData theft and extortionOpportunistic targeting of vulnerable organizations

Target Sectors

Healthcare and public healthEducation (K-12 schoolsuniversities)Government agenciesManufacturingInformation technologyFinancial servicesCritical infrastructureTechnology

Activity Timeline

First Seen

May 2023

Last Seen

Jan 2024

Quick Facts

OriginUnknown (likely Eastern Europe or Russia-nexus)
Sophisticationintermediate
StatusActive

MITRE ATT&CK Techniques

(24)

Impact

T1486

Data Encrypted for Impact

Encrypt victim data to disrupt availability, typically for ransom.

T1490

Inhibit System Recovery

Delete backups, shadow copies, or recovery partitions to prevent restoration.

T1489

Service Stop

Stop critical services to disrupt operations or aid in data destruction.

Execution

T1047

Windows Management Instrumentation

Use WMI to execute commands and manage systems remotely.

T1059.001

PowerShell

Use PowerShell commands and scripts for execution and automation.

T1059.003

Windows Command Shell

Use cmd.exe to execute commands and batch scripts.

Initial Access

T1078

Valid Accounts

Use legitimate credentials to authenticate and gain access.

T1190

Exploit Public-Facing Application

Exploit vulnerabilities in internet-facing applications to gain access.

T1133

External Remote Services

Abuse remote services like VPNs or RDP to gain access to the network.

Discovery

T1083

File and Directory Discovery

Enumerate files and directories to find sensitive data or binaries.

T1018

Remote System Discovery

Discover remote systems on the network for lateral movement targets.

T1082

System Information Discovery

Collect OS version, architecture, hostname, and other system details.

Credential Access

T1003.001

LSASS Memory

Access LSASS process memory to extract credential material.

Lateral Movement

T1021.001

Remote Desktop Protocol

Use RDP to connect to and control remote systems.

Other

T1033

T1033

T1567.002

T1567.002

T1112

T1112

T1562.001

T1562.001

T1070.004

T1070.004

T1210

T1210

T1569.002

T1569.002

Collection

T1005

Data from Local System

Collect sensitive data stored on the local file system.

Exfiltration

T1048

Exfiltration Over Alternative Protocol

Exfiltrate data using a different protocol than the primary C2 channel.

Defense Evasion

T1027

Obfuscated Files or Information

Encrypt, encode, or obfuscate payloads and data to evade detection.

Tools & Malware

(9)

Rhysida Ransomware

malwareMalicious

Malware used by Rhysida.

Cobalt Strike

frameworkLegitimate

Legitimate tool used by Rhysida.

PowerShell

legitimate toolLegitimate

Legitimate tool used by Rhysida.

Windows Management Instrumentation (WMI)

malwareMalicious

Malware used by Rhysida.

PsExec

legitimate toolLegitimate

Legitimate tool used by Rhysida.

Mimikatz

legitimate toolLegitimate

Legitimate tool used by Rhysida.

Advanced Port Scanner

malwareMalicious

Malware used by Rhysida.

7-Zip (for data staging)

malwareMalicious

Malware used by Rhysida.

WinRAR (for data compression)

malwareMalicious

Malware used by Rhysida.

Indicators of Compromise

(6)
IOC values are defanged for safety
TypeValueNotes
hash8b5078c9f0f1e2e20f8c0b4d35c6a7b9f5e8d2c1a4b7f9e3d6c8a5b2f1e4d7c9Rhysida ransomware executable (SHA256)
hash8886c554ba622c0a8b43723e8ba2e2c26bfb88e7Rhysida ransomware sample (SHA1)
domainrhysidafohrhyy2aszi7bm32tnjat5xri65fopcxkdfxhi4tidsg7cad[.]onionRhysida data leak site (Tor)
domainrhysida7vbobdhtoxmtyy43kkmvxqjsklpnhkpwzrhzlx3s6jqjqhid[.]onionRhysida victim negotiation portal (Tor)
urlhxxp[[://]]rhysidafohrhyy2aszi7bm32tnjat5xri65fopcxkdfxhi4tidsg7cad[.]onion/blogRhysida blog/leak site URL
hash3d5a5b7e8f9c2d1a4b6e8f7a9c2d5e1f3a4b6c8d9e1f2a3b5c7d8e9f1a2b3c4Rhysida PDF ransom note hash (SHA256)

Infrastructure

(1)
Domain values are defanged for safety
Domain / HostTypeStatusLast Checked
codeforprofessionalusers[.]comdomainofflineApr 2, 2026

Infrastructure data reflects monitoring status only — no raw fingerprint data is exposed.

References

(7)

CISA Cybersecurity Advisory: #StopRansomware: Rhysida Ransomware

https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-319a

Microsoft Threat Intelligence: Rhysida Ransomware

https://www.microsoft.com/en-us/security/blog/threat-intelligence/

Health Sector Cybersecurity Coordination Center (HC3): Rhysida Ransomware Threat Profile

https://www.hhs.gov/sites/default/files/rhysida-ransomware-analyst-note.pdf

Cisco Talos: Rhysida Ransomware Analysis

https://blog.talosintelligence.com/rhysida-ransomware/

MITRE ATT&CK: Rhysida Software

https://attack.mitre.org/software/S1073/

Cybereason: Rhysida Ransomware: A Comprehensive Technical Analysis

https://www.cybereason.com/blog/threat-analysis-rhysida-ransomware

FBI Flash: Rhysida Ransomware

https://www.ic3.gov/Media/News/2023/231115.pdf