Your IP:Unknown

·

Your Status: Unknown

Skip to main content


Pysa ransomware: What it is and how to protect yourself

Pysa ransomware infiltrates your network to steal your data and hold it ransom by encrypting your files. It targets higher education institutions, healthcare providers, and private companies in the US and beyond. So how dangerous is Pysa, and how can you stay safe?

Dec 28, 2023

6 min read

Pysa ransomware

What is Pysa ransomware?

Pysa is a form of human-operated ransomware that encrypts data on a victim’s computer and demands a ransom for restoring access. Pysa stands for “Protect your system amigo,” which is a sentence included in the ransom note left on infected devices.

Pysa is categorized as a Ransomware-as-a-Service (RaaS), which means that its developers offer ransomware for other criminal organizations that don’t have the capabilities of producing their own malicious programs. The previous version of this ransomware was known as Mespinoza.

The cybercriminals behind Pysa target high-value organizations like government institutions or healthcare providers that are more time-sensitive. Imagine if a hospital was locked out of its patients’ data and couldn’t access its IT systems. Every wasted minute could be fatal and lead to damaged reputation, financial losses, and lawsuits.

How does Pysa ransomware work?

Pysa, or Mespinoza ransomware, works by infiltrating the victim’s computer or network and locking the victim out of their files. Hackers use phishing emails, brute-force attacks on servers in which the RDP (Remote Desktop Protocol) or AD (Active Directory) is open to the internet, and social engineering techniques to spread Pysa ransomware. However, Pysa ransomware distribution also relies on exploiting vulnerabilities in network infrastructure, for example, insecure remote access systems.

Once inside the system, Pysa encrypts the files and data so that you can’t access them. The ransomware then displays a ransom note demanding payment, usually in cryptocurrency, in exchange for a decryption key to unlock the files. Victims are allowed to send two files (no more than 2 MB) to criminals, so they can decrypt them and prove that their ransom demands are serious. Known for exfiltrating data before encryption, Pysa adds additional pressure for its victims by threatening to release sensitive information publicly.

How does Pysa encrypt your files?

Pysa encrypts all non-system files using AES encryption combined with RSA. Even if you delete the ransomware from your computer and restore your system, your files will still be inaccessible. When Pysa encrypts your files, they all acquire the .pysa filename extension. Let’s say you have a file called “cat.avi”. After your device is infected with ransomware, the filename will change to “cat.avi.pysa”.

Before encrypting your files, hackers steal all the sensitive data from the targeted computer, so they have leverage against you. If you refuse to meet their ransom demands, they can dump all the stolen data on the dark web.

However, you can never be sure if hackers will decrypt your files even after paying them. Cybersecurity experts discourage people from paying ransoms and feeding this business model.

The most notorious Pysa ransomware attackss

The most notorious Pysa ransomware attacks have affected public sector organizations and industries with sensitive data. Originating in 2019, Pysa ran rampant in 2020 and 2021, and it’s still active today.

  • In May 2020, MyBudget, an Australian financial services company, was hit by Pysa and went out of service for almost two weeks. Criminals posted MyBudget’s name on the dark web along with those of other businesses they successfully hacked, pressuring them to pay the ransom. The company’s name was later removed from the dark web, suggesting that they negotiated with the hackers and met their demands.
  • In October 2020, Hackney Council in London confirmed it had been a victim of a Pysa ransomware attack, which affected its IT services. Several months later, criminals dumped a bunch of their stolen data online, containing passport details, photo IDs, and staff information.
  • In April 2021, Haverhill Public Schools in Massachusetts were closed after Pysa ransomware attacked their computer systems. Public schools are especially vulnerable to cyberattacks because many of them use outdated software and their staff lack cybersecurity training. The FBI claims that Pysa has been used against a number of schools in the US and the UK and continues to search for new victims.

How to stay safe from Pysa ransomware

Train your staff. Raising awareness among your employees about phishing emails and ransomware is key to successfully fighting cybercriminals. Many organizations conduct phishing simulations, so their employees can learn how to identify malicious emails.

Update your software on time. Postponing software updates can put a device at serious risk because criminals might exploit a bug or vulnerability that software developers fixed months ago. Even in global corporations you can still find employees running old versions of software that should have been updated multiple times.

Use strong passwords. Make sure to use uppercase and lowercase letters combined with special characters and numbers in your passwords. It’s important to create unique passwords for all your accounts because one compromised account could open the gates to other services you use.

Backup your files. Many people think nothing will ever happen to them — until it does. Don’t take unnecessary risks and always back up your sensitive data. You can never be sure if you won’t end up with malware, ransomware, or any other malicious program on your computer.

How to improve your overall digital security

Apart from software updates and strong passwords, one of the most common ways to improve your overall digital security is to use a reputable VPN. A VPN redirects your internet data through an encrypted tunnel, thus improving your online security. If you often connect to public networks, having a VPN enabled on your device is crucial for staying safe.

With one NordVPN account, you can protect up to 10 different devices: laptops, tablets, smartphones, and more. NordVPN has 7000 servers in 113 countries, providing users with the best speeds in the VPN industry. While a VPN won’t directly protect against malware infection, it will raise your overall privacy and security.

Businesses can also benefit from NordLayer, which allows employees to securely access their company’s data and online resources.

NordVPN also offers the Threat Protection Pro feature that neutralizes cyber threats before they can do any real damage to your device. It helps you identify malware-ridden files, stops you from landing on malicious websites, blocks trackers and stops intrusive ads on the spot.

FAQ

Like what you’re reading?

Get the latest stories and announcements from NordVPN

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

We won’t spam and you will always have the choice to unsubscribe


author irma png

Irma Šlekytė

An online privacy enthusiast, Irma approaches her writing about cybersecurity with an "I can help!" attitude. With particular interest in cyber hygiene, she strives to share practical insights with NordVPN readers.