The Rhysida ransomware-as-a-service (RaaS) group has swiftly transformed from an unknown entity to a well-established ransomware operation. Despite some incomplete features in its development, this group made a significant impact by launching a highly publicized attack on the Chilean Army at the end of May. This event reflects a growing trend of ransomware groups targeting government institutions in Latin America. Notably, on June 15, the Rhysida group leaked the stolen files from the Chilean Army, amplifying concerns about their capabilities and intentions.
The Rhysida ransomware is a 64-bit Portable Executable (PE) Windows application, created using the MINGW/GCC compiler. Analysis of various samples indicates that the program is still in its early stages of development, as evidenced by its program name, Rhysida-0.1. One notable feature of this ransomware tool is the presence of plain-text strings, which reveal the commands used for modifying the system's registry. To encrypt victim's files, Rhysida employs a robust 4096-bit RSA key in conjunction with the ChaCha20 algorithm, ensuring a high level of cryptographic security.
Rhysida Ransomware Signatures
Rhysida Ransomware Download