PYSA Ransomware Group: Experts Share In-Depth Details

This article has been indexed from CySecurity News – Latest Information Security and Hacking Incidents

 

Since August 2020, the cybercrime group adopted a five-stage system design, with the malware developers prioritizing enhancements to boost the efficiency of its activities, according to an 18-month examination of the PYSA ransomware operation. The GSOC explores the PYSA ransomware inside this Threat Analysis Report. Once the Federal Bureau of Investigation (FBI) informed of the ransomware’s increased activity and significant harmful impact early this year, it became known as the PYSA ransomware. 
This includes a user-friendly tool, such as a full-text search engine, to make metadata extraction easier and allow threat actors to easily locate and access victim information. “The group is notorious for thoroughly researching high-value targets before unleashing its operations, compromising business systems, and forcing researchers to pay significant ransoms to retrieve sensitive data,” stated PRODAFT, a Swiss cybersecurity firm, in a comprehensive report released last week. 
PYSA, which stands for “Protect Your System, Amigo” and is a descendant of the Mespinoza ransomware, was initially discovered in December 2019 and has since risen to become the third most common ransomware strain reported in the fourth quarter of 2021. The cybercriminal cell is thought to have exfiltrated confidential info linked to as many as 747 individuals since September 2020, until its databases were taken down earlier this January. 

[…]
Content was cut in order to protect the source.Please visit the source for the rest of the article.

Read the original article: PYSA Ransomware Group: Experts Share In-Depth Details