Inactive ransomware operator
← All groupshive
208 victims indexed · first seen 5 years ago · last activity 3 years ago
At a glance
- Status
- inactive
- First seen
- 5 years ago
- Last activity
- 3 years ago
- Primary sector
- Manufacturing · 16 hits
About
References
47 linksExternal sources curated by the MISP threat-intel community.
- malpedia.caad.fkie.fraunhofer.de/details/win.hive
- s3.amazonaws.com/talos-intelligence-site/production/document_files/files/000/095/787/original/ransomware-chats.pdf
- sentinelone.com/labs/hive-attacks-analysis-of-the-human-operated-ransomware-targeting-healthcare/
- trendmicro.com/vinfo/us/security/news/ransomware-spotlight/ransomware-spotlight-hive
- microsoft.com/en-us/security/blog/2022/07/05/hive-ransomware-gets-upgrades-in-rust/
- yoroi.company/wp-content/uploads/2022/07/Yoroi-On-The-Footsteps-of-Hive-Ransomware.pdf
- varonis.com/blog/hive-ransomware-analysis
- bleepingcomputer.com/news/security/microsoft-exchange-servers-hacked-to-deploy-hive-ransomware/
- inf.news/en/tech/c28d9382ab78a5ac3d8fc802f3f0f1e0.html
- healthcareitnews.com/news/fbi-issues-alert-about-hive-ransomware
- arxiv.org/pdf/2202.08477.pdf
- blog.group-ib.com/hive
- blogs.vmware.com/security/2022/09/esxi-targeting-ransomware-the-threats-that-are-after-your-virtual-machines-part-1.html
- github.com/rivitna/Malware/tree/main/Hive
- lifars.com/2022/02/how-to-decrypt-the-files-encrypted-by-the-hive-ransomware/
- media.kasperskycontenthub.com/wp-content/uploads/sites/43/2022/06/23093553/Common-TTPs-of-the-modern-ransomware_low-res.pdf
- query.prod.cms.rt.microsoft.com/cms/api/am/binary/RE54L7v
- securityaffairs.co/wordpress/128232/security/recover-files-hive-ransomware.html
- thehackernews.com/2022/02/master-key-for-hive-ransomware.html
- therecord.media/academics-publish-method-for-recovering-data-encrypted-by-the-hive-ransomware/
Timeline
15 monthsTop countries
Top sectors
MITRE ATT&CK
34 techniques · 11 tacticsTactics
Techniques
- T1027.002Software Packing
- T1027.010Command Obfuscation
- T1027.013Encrypted/Encoded File
- T1055.001Dynamic-link Library Injection
- T1059.001PowerShell
- T1059.003Windows Command Shell
- T1059.005Visual Basic
- T1059.007JavaScript
- T1069Permission Groups Discovery
- T1071.001Web Protocols
- T1078.002Domain Accounts
- T1087.003Email Account
- T1105Ingress Tool Transfer
- T1106Native API
- T1112Modify Registry
- T1140Deobfuscate/Decode Files or Information
- T1204.001Malicious Link
- T1204.002Malicious File
- T1218.007Msiexec
- T1218.011Rundll32
- T1486Data Encrypted for Impact
- T1552.001Credentials In Files
- T1553.002Code Signing
- T1553.005Mark-of-the-Web Bypass
- T1555.003Credentials from Web Browsers
- T1559.002Dynamic Data Exchange
- T1566.001Spearphishing Attachment
- T1566.002Spearphishing Link
- T1568.001Fast Flux DNS
- T1583.001Domains
- T1588.001Malware
- T1588.002Tool
- T1608.001Upload Malware
- T1685Disable or Modify Tools
Recent victims
Loading…
Source
Updated 3 years agoData on this page is sourced from the group's own leak posts, cross-checked with public ransomware trackers (RansomLook, ransomware.live, RansomWatch), MITRE ATT&CK, and our own Tor and Telegram crawlers. This is a public observatory page — share freely.
