Inactive ransomware operator
← All groupsHiveleak
208 victims indexed · first seen 5 years ago · last activity 3 years ago
At a glance
- Status
- inactive
- First seen
- 5 years ago
- Last activity
- 3 years ago
- Onion sites
- 5 known endpoints
- Primary sector
- Manufacturing · 17 hits
About
Timeline
15 monthsTop countries
Top sectors
MITRE ATT&CK
11 techniques · 8 tacticsTactics
Techniques
- T1566Phishing
- T1190Exploit Public-Facing Application
- T1059Command and Scripting Interpreter
- T1027Obfuscated Files or Information
- T1083File and Directory Discovery
- T1018Remote System Discovery
- T1021Remote Services
- T1005Data from Local System
- T1039Data from Network Shared Drive
- T1041Exfiltration Over C2 Channel
- T1486Data Encrypted for Impact
Recent victims
Loading…
Onion infrastructure
5 known- http://hiveapi4nyabjdfz2hxdsr7otrcv6zq6m4rk5i2w7j64lrtny4b7vjad.onion
- http://hiveapi4nyabjdfz2hxdsr7otrcv6zq6m4rk5i2w7j64lrtny4b7vjad.onion/v1/companies/disclosed
- http://hivecust6vhekztbqgdnkks64ucehqacge3dij3gyrrpdp57zoq3ooqd.onion
- http://hiveleakdbtnp76ulyhi52eag6c6tyc3xw7ez7iqy6wc34gd2nekazyd.onion
- http://hiveleakdbtnp76ulyhi52eag6c6tyc3xw7ez7iqy6wc34gd2nekazyd.onion/
Source
Updated 3 years agoData on this page is sourced from the group's own leak posts, cross-checked with public ransomware trackers (RansomLook, ransomware.live, RansomWatch), MITRE ATT&CK, and our own Tor and Telegram crawlers. This is a public observatory page — share freely.
