Skip to main content
Creating a new NHS England: Health Education England, NHS Digital and NHS England have merged. More about the merger.

Pysa Ransomware

Pysa is a new ransomware tool operated by an unknown APT group. Much like the more well-known Ryuk, Sobinokibi, and Maze ransomware, it also targets large or particularly high-value finance, government and healthcare organisations.

Report a cyber attack: call 0300 303 5222 or email [email protected]

Summary

Pysa is a new ransomware tool operated by an unknown APT group. Much like the more well-known Ryuk, Sobinokibi, and Maze ransomware, it also targets large or particularly high-value finance, government and healthcare organisations.


Affected platforms

The following platforms are known to be affected:

Threat details

Introduction

First observed on October 2019, Pysa (also known as Mespinoza) is a human-operated ransom tool created by an as yet unidentified advanced persistent threat group.

As with other popular ransomware in 2020 such as Ryuk and Maze; Pysa focuses on high value financial and governmental targets, but has also been involved in attacks on healthcare, education, and law enforcement organisations.


Delivery

PYSA ransomware is delivered via brute-force attacks on exposed Active Directory services or other management interfaces, spam or phishing email campaigns, and unauthorized Remote Desktop Protocol (RDP) connections to domain controllers. The attackers methodically scan network files and use PsExec to move laterally.


Activities

Once delivered, Pysa will attempt to extract sensitive information (credentials, databases, or internal business files) before encrypting all accessible non-system file using an AES implementations, the keys for which are then encrypted with RSA.

Data stolen by Pysa will then be used by its operators to extort affected organisations into meeting their ransom demands. Organisations that do not comply will have their date posted on a leak site controlled by Pysa's operators.


Threat updates

Date Update
1 Apr 2021 Delivery and host indicators updated

Information on the delivery mechanism has been updated and additional file hashes added.


Remediation advice

If a device on your network becomes infected with ransomware it will begin encrypting files, which may also include remote files on network locations. The only guaranteed way to recover from a ransomware infection is to restore all affected files from their most recent backup. To limit the impact of a ransomware infection, NHS Digital advises that:

  • Critical data is frequently saved in multiple backup locations.
  • At least one backup is kept offline at any time (separated from live systems).
  • Backups and incident recovery plans are tested to ensure that data can be restored when needed.
  • User account permissions for modifying data are regularly reviewed and restricted to the minimum necessary.
  • Infected systems are disconnected from the network and powered down as soon as practicable.
  • Any user account credentials that may have been compromised should be reset on a clean device
  • Where infected systems cannot be quarantined with confidence, then an affected organisation should disconnect from national networks to limit propagation.

Additionally, to prevent and detect an infection, NHS Digital advises that:

  • Secure configurations are applied to all devices.
  • Security updates are applied at the earliest opportunity.
  • Tamper protection settings in security products are enabled where available.
  • Obsolete platforms are segregated from the rest of the network.
  • IT usage policies are reinforced by regular training to ensure all users know not to open unsolicited links or attachments.
  • Multi-factor authentication (MFA) and lockout policies are used where practicable, especially for administrative accounts.
  • Administrative accounts are only used for necessary purposes.
  • Remote administration services use strongly encrypted protocols and only accept connections from authorised users or locations.
  • Systems are continuously monitored, and unusual activity is investigated, so that a compromise of the network can be detected as early as possible.

Please note that NCSC maintains guidance for securely configuring a wide range of end user device (EUD) platforms. For further details refer to their end user device security guidance pages.


Indicators of compromise

Host indicators

SHA256 hashes

  • 0f0014669bc10a7d87472cafc05301c66516857607b920ddeb3039f4cb8f0a50
  • 1a0ff707938a1399e23af000567806a87fff9b8789ae43badb4d28d4bef1fb81
  • 327934c4c11ba37f42a91e1b7b956d5a4511f918e63047a8c4aa081fd39de6d9
  • 327934c4c11ba37f42a91e1b7b956d5a4511f918e63047a8c4aa081fd39de6d9
  • 425945a93beb160f101d51de36363d1e7ebc45279987c3eaf5e7f183ed0a3776
  • 4770a0447ebc83a36e590da8d01ff4a418d58221c1f44d21f433aaf18fad5a99
  • 48355bd2a57d92e017bdada911a4b31aa7225c0b12231c9cbda6717616abaea3
  • 5510ae74b7e2a10fdafa577dc278612f7796b0252b7d1438615e26c49e1fc560
  • 61bb42fe06b3511d512af33ef59baa295b29bd62eb4d0bf28639c7910a65e4ae
  • 6661b5d6c8692bd64d2922d7ce4641e5de86d70f5d8d10ab82e831a5d7005acb
  • 7fd3000a3afbf077589c300f90b59864ec1fb716feba8e288ed87291c8fdf7c3
  • a18c85399cd1ec3f1ec85cd66ff2e97a0dcf7ccb17ecf697a5376da8eda4d327
  • a87995539ce200aa4896b8aa2f5d97a6ce80d65924356da9cfde10312c35762e
  • b1381635c936e8de92cfa26938c80a359904c1d709ef11ee286ba875cfb7b330
  • e4287e9708a73ce6a9b7a3e7c72462b01f7cc3c595d972cf2984185ac1a3a4a8
  • e9662b468135f758a9487a1be50159ef57f3050b753de2915763b4ed78839ead
  • f0939ebfda6b30a330a00c57497038a54da359e316e0d6e6e71871fd50fec16a

Last edited: 1 April 2021 1:56 pm