Hunters International

Threat Actor updated 22 days ago (2024-11-29T13:56:00.479Z)
Download STIX
Preview STIX
Hunters International, an active threat actor group since October of the previous year, has been identified as a significant cybersecurity concern. The group has taken over and rebranded the Hive ransomware, despite their disputes about this association. This development followed the disbandment of the original Hive group by international law enforcement. Hunters International has been linked to Russia and is known for its indiscriminate targeting approach, focusing on opportunistic means rather than prioritizing any specific sector or region. The group's modus operandi involves exfiltrating data from victim organizations prior to encrypting files, changing file extensions to .locked, and leaving a README message with payment instructions through a chat portal on the Tor network. In one notable attack, the Hunters International ransomware gang claimed responsibility for leaking terabytes of sensitive data, including HR records, financial documents, personal employee information, and even specific case information and operational data from the FBI. They have also posted 386 GB of data that includes files on other gangs. Researchers from Quorum Cyber have identified a new Remote Access Trojan (RAT) associated with Hunters International, dubbed SharpRhino. This RAT is designed to establish persistence and control over targeted systems, facilitating sophisticated ransomware attacks for financial gain. The installer system modifies registry keys and establishes directories to facilitate multiple channels to Hunters International's command and control (C2) as a fallback mechanism. The evolution of SharpRhino demonstrates the progression of Hunters International's capabilities and sophistication in carrying out cyberattacks.
Description last updated: 2024-10-21T08:32:27.672Z
What's your take? (Question 1 of 5)
Help tune the shared Cybergeist dataset, assist your peers, and earn karma. Expand the panel to get started.
Possible Aliases / Cluster overlaps
It's hard to track cluster overlaps and naming conventions between vendors, so here are some possible overlapping names / profiles you also may want to look at. Create a free account to see the source evidence for each alias, and help fix any errors.
Alias DescriptionVotes
Hive is a possible alias for Hunters International. Hive is a form of malware, specifically ransomware, designed to exploit and damage computer systems. It infiltrates systems through suspicious downloads, emails, or websites, often without the user's knowledge. Once inside, Hive can steal personal information, disrupt operations, or hold data hostag
5
Hive Ransomware is a possible alias for Hunters International. Hive ransomware, a prominent threat actor active in 2022, was known for its widespread malicious activities in numerous countries, including the US. The group's modus operandi involved the use of SharpRhino, which upon execution, established persistence and provided remote access to the attackers, e
4
Blackmatter is a possible alias for Hunters International. BlackMatter, a threat actor in the cybersecurity realm, is known for its malicious activities and has been linked to several ransomware strains. The group emerged as a successor to the DarkSide ransomware, which was responsible for the high-profile attack on the Colonial Pipeline in May 2021. Howeve
2
Miscellaneous Associations
Other elements of context that could aid in the identification of relevance
Ransomware
Malware
Source
Ransom
Analyst Notes & Discussion
Be the first to leave your mark here! Log in to share your views and vote.
Associated Malware
To see the evidence that has resulted in these malware associations, create a free account
Alias DescriptionAssociation TypeVotes
The Hunters Malware is associated with Hunters International. Malware hunters, often referred to as bug hunters, play a critical role in cybersecurity by identifying and addressing vulnerabilities in software systems. In 2023, these professionals proved their worth at the Pwn2Own Toronto event where they identified 58 unique zero-day vulnerabilities, earning aUnspecified
2
The Lockbit Malware is associated with Hunters International. LockBit is a prominent ransomware-as-a-service (RaaS) malware that has been involved in numerous cyberattacks, demonstrating its staying power and adaptability. The malware, which can infiltrate systems through suspicious downloads, emails, or websites, is designed to exploit and damage computers orUnspecified
2
The Conti Malware is associated with Hunters International. Conti is a type of malware, specifically ransomware, which is designed to infiltrate and damage computer systems. This malicious software can enter systems through various methods such as suspicious downloads, emails, or websites, often without the user's knowledge. Once inside, it can steal personaUnspecified
2
The Akira Malware is associated with Hunters International. Akira is a potent ransomware that has been active since 2023, known for its aggressive encryption tactics and swift deployment. This malware, which brings a unique '80s aesthetic to the dark web, has quickly risen in prominence within the cybercrime landscape. It has targeted hundreds of victims gloUnspecified
2
The SharpRhino Malware is associated with Hunters International. SharpRhino is a new malware employed by Hunters International, a group linked to Russia, with the primary purpose of infiltrating targeted infrastructure and establishing persistence. The malware disguises itself as the open-source network-administration tool, Angry IP Scanner, using typosquatting dUnspecified
2
Associated Threat Actors
To see the evidence that has resulted in these threatActor associations, create a free account
Alias DescriptionAssociation TypeVotes
The Bl00dy Threat Actor is associated with Hunters International. Bl00dy is a threat actor known for its malicious activities in the cyber world. The group, along with another threat actor called Black Basta, have recently been identified as exploiting bugs in ConnectWise ScreenConnect, a popular remote management tool. This exploitation has led to a significant iUnspecified
2
Source Document References
Information about the Hunters International Threat Actor was read from the documents corpus below. This display is limited to 20 results, create a free account to see more
PreviewSource LinkCreatedAtTitle
DARKReading
20 days ago
Securityaffairs
2 months ago
Checkpoint
3 months ago
Malwarebytes
4 months ago
Securityaffairs
4 months ago
DARKReading
4 months ago
CERT-EU
a year ago
CERT-EU
a year ago
InfoSecurity-magazine
8 months ago
BankInfoSecurity
8 months ago
Checkpoint
8 months ago
CERT-EU
9 months ago
CERT-EU
10 months ago
CERT-EU
10 months ago
Unit42
a year ago
CERT-EU
a year ago
CERT-EU
a year ago
CERT-EU
a year ago
DARKReading
a year ago
CERT-EU
a year ago