HomeNewsThe Resurgence of Hive Ransomware: Unveiling Hunters International Threat

The Resurgence of Hive Ransomware: Unveiling Hunters International Threat

Learn how cyber threats have changed over time, such as the possible reappearance of the infamous Hive Ransomware in the form of Hunters International. Bitdefender's research delves into shared code and strategy moves, illuminating a constantly evolving cyber threat scenario.

-

We independently research, test, review, and recommend the best products—learn more about our process. If you buy something through our links, we may earn a commission. learn more

Last Updated on 05/12/2023 by Dolly

Cybersecurity Threat Analysis

Bitdefender experts have just revealed that they believe the notorious Hive Ransomware is making a comeback as Hunters International. The cyber threat landscape looks to evolve with a successor, despite the attempts of the FBI and Europol to dismantle it in January 2023.

cyberattack

Coding Strategies and Intersections

According to the blog post published by Bitdefender, the leadership of Hive has made strategic actions, including suspending operations and transferring assets to the newly recognized threat, Hunters International. Security analysts have found worrying similarities in the codes of the two groups, suggesting a 60% code match.

hive-ransomware

The Financial and Administrative Freedom of Hunters International

Hunters International refutes rumors that it is simply Hive under a different name. The group claims it is autonomous, saying it has bought the Hive infrastructure and fixed its source code. The group’s primary method of operation is data exfiltration rather than encryption; victims in the United States, the United Kingdom, Germany, and Namibia are among its primary targets.

hunters-international

Ransomware as a Service and Other Unusual Techniques

Hunters International uses a novel strategy, selling Ransomware-as-a-Service using Rust-language ransomware. Their approaches require generating two key sets in memory for file encryption, stored as the encrypted drive’s root with a .key suffix. GravityZone from Bitdefender has detected this file as a Trojan. When it comes to Ransom.Hunters, the team favors a less-is-more philosophy, opting for malware with fewer moving parts and fewer command-line options.

data-leak-hunters-international

Revealing the Rise of Convergent Technologies

Will Thomas, aka @BushidoToken, a security researcher, uncovered shocking parallels and code overlaps between both parties, with a reported 60% similarity. This similarity hints at the consistency and continuity of Hive’s harmful actions.

The Resurgence of Hive Ransomware: Unveiling Hunters International Threat 1

The World-Wide Consequences: Aiming for Victims All Over

Despite ongoing debates on the connection between Hive and Hunters International, the broader picture highlights the ever-evolving nature of ransomware groups. The geographical reach expands as the group targets victims globally, posing a significant challenge for international cybersecurity efforts.

international-cybersecurity

Read More:
  1. Strengthen Your Defense with a Robust Cybersecurity Checklist for the Shields Ready Campaign in 2023
  2. Learn About the Ethical Challenges Presented by Offensive Cybersecurity Operations and “Hacktivism”
  3. New Cybersecurity Regulations: A Step-by-Step Guide to Compliance
  4. The Power of Federated Learning to Change Data Privacy
  5. Navigating the Ethical Terrain of AI and Machine Learning step by step
Candeğer Şen
Candeğer Şen
Hello, I'm Candeğer Şen, a devoted language enthusiast with a profound interest in both human and machine languages, software development, and the art of persuasive copywriting.
- Advertisment -

Must Read

Data Science Drives Personalized Marketing and Customer Engagement to New Heights...

0
Personalized marketing and customer engagement are crucial for businesses to thrive in the current digital era. Because data science makes it possible for marketers...