Hive0065, also known as Graceful Spider, TA505, Gold Evergreen, TEMP.Warlock, Chimborazo, or FIN11, is a financially motivated cybercrime group that has been actively targeting various industries such as finance, retail and restaurants since at least 2014. The group has been notorious for distributing spearphishing emails, notably in 2019 when they impersonated Onehub to trick users into downloading the SDBbot remote access trojan (RAT). Onehub’s file-storage services were used in these malspam emails to host various malware, a common practice among multiple threat actors.
The group's arsenal of tactics, techniques, and procedures (TTPs), command-and-control (C&C) infrastructure, and specific malware use have consistently pointed towards Hive0065's involvement in numerous attacks. Notably, the SDBbot RAT has been observed in Hive0065 attacks since at least September 2019, primarily used as a secondary payload. This malware, composed of an installer, a loader, and RAT components, continues to be spread by Hive0065 alongside other custom malware, demonstrating the group's persistent threat.
In more recent developments, Hive0065 has exploited global events to further their malicious activities. In 2020, the group targeted healthcare organizations with emails purporting to come from medical research groups, offering supposed Coronavirus remedies in exchange for bitcoin payments. They also capitalized on the interest in the COVID-19 pandemic, using Coronavirus-themed phishing emails to deliver the Locky ransomware and the Dridex banking Trojan. As X-Force IRIS continues to track Hive0065, it is expected that the group will continue to target a wide range of industries, constantly adjusting its TTPs and C&C infrastructure to evade detection.
Description last updated: 2024-05-04T16:42:30.257Z