Hive0065

Threat Actor Profile Updated 3 months ago
Download STIX
Preview STIX
Hive0065, also known as Graceful Spider, TA505, Gold Evergreen, TEMP.Warlock, Chimborazo, or FIN11, is a financially motivated cybercrime group that has been actively targeting various industries such as finance, retail and restaurants since at least 2014. The group has been notorious for distributing spearphishing emails, notably in 2019 when they impersonated Onehub to trick users into downloading the SDBbot remote access trojan (RAT). Onehub’s file-storage services were used in these malspam emails to host various malware, a common practice among multiple threat actors. The group's arsenal of tactics, techniques, and procedures (TTPs), command-and-control (C&C) infrastructure, and specific malware use have consistently pointed towards Hive0065's involvement in numerous attacks. Notably, the SDBbot RAT has been observed in Hive0065 attacks since at least September 2019, primarily used as a secondary payload. This malware, composed of an installer, a loader, and RAT components, continues to be spread by Hive0065 alongside other custom malware, demonstrating the group's persistent threat. In more recent developments, Hive0065 has exploited global events to further their malicious activities. In 2020, the group targeted healthcare organizations with emails purporting to come from medical research groups, offering supposed Coronavirus remedies in exchange for bitcoin payments. They also capitalized on the interest in the COVID-19 pandemic, using Coronavirus-themed phishing emails to deliver the Locky ransomware and the Dridex banking Trojan. As X-Force IRIS continues to track Hive0065, it is expected that the group will continue to target a wide range of industries, constantly adjusting its TTPs and C&C infrastructure to evade detection.
What's your take? (Question 1 of 5)
Help tune the shared Cybergeist dataset, assist your peers, and earn karma. Expand the panel to get started.
Possible Aliases / Cluster overlaps
It's hard to track cluster overlaps and naming conventions between vendors, so here are some possible overlapping names / profiles you also may want to look at.
IDVotesProfile Description
TA505
1
TA505, also known as Cl0p Ransomware Gang and Lace Tempest, is a highly active and sophisticated cybercriminal group. The group has been associated with various high-profile cyber-attacks, demonstrating adaptability through a multi-vector approach to their operations. In June 2023, the U.S. Cybersec
fin11
1
FIN11, a threat actor group also known as Lace Tempest or TA505, has been linked to the development and deployment of Cl0p ransomware. This malicious software is believed to be a variant of another ransomware, CryptoMix, and is typically used by FIN11 to encrypt files on a victim's network after ste
Chimborazo
1
None
Miscellaneous Associations
Other elements of context that could aid in the identification of relevance
Exploit
Trojan
Malware
Ransomware
Rat
Cybercrime
exploited
Loader
Payload
Bitcoin
Spearphishing
Phishing
Associated Malware
To see the evidence that has resulted in this association, create a free account
IDTypeVotesProfile Description
SDBbotUnspecified
1
SDBbot is a malicious software (malware) that infiltrates computer systems typically through deceptive downloads, emails, or websites. In the context of cyber threats, it falls under the category of custom malware, used by threat groups such as GOLD TAHOE. Other common offensive security tools and c
DridexUnspecified
1
Dridex is a well-known malware, specifically a banking Trojan, that has been utilized by cybercriminals to exploit and damage computer systems. The malware infiltrates systems through dubious downloads, emails, or websites, often unbeknownst to the user, and can steal personal information, disrupt o
Associated Threat Actors
To see the evidence that has resulted in this association, create a free account
IDTypeVotesProfile Description
No associations to display
Associated Vulnerabilities
To see the evidence that has resulted in this association, create a free account
IDTypeVotesProfile Description
Graceful Spider Ta505Unspecified
1
None
Source Document References
Information about the Hive0065 Threat Actor was read from the documents corpus below. This display is limited to 20 results, create a free account to see more
SourceCreatedAtTitle
MITRE
a year ago
Probable Iranian Cyber Actors, Static Kitten, Conducting Cyberespionage Campaign Targeting UAE and Kuwait Government Agencies
MITRE
a year ago
TA505 Continues to Infect Networks With SDBbot RAT