Hive is a financially motivated ransomware group that emerged in August 2021, operating as a Ransomware-as-a-Service (RaaS) model to maximize their criminal enterprise's reach and profitability. The group is suspected to have origins in Eastern Europe based on their operational patterns and linguistic indicators, though definitive attribution remains unclear, and they operate independently while recruiting affiliates to conduct attacks on their behalf. Hive primarily gains initial access through compromised Remote Desktop Protocol (RDP) credentials, phishing campaigns, and exploitation of known vulnerabilities in public-facing applications, subsequently deploying their custom ransomware payload that uses a combination of RSA and AES encryption algorithms while simultaneously exfiltrating sensitive data before encryption to enable double extortion tactics where they threaten to publish stolen information if ransom demands are not met. The group has targeted over 208 victims globally with a particular focus on manufacturing companies, business services, information technology firms, healthcare services, and internet and telecommunication services, primarily in the United States, United Kingdom, Netherlands, Indonesia, and China, including notable attacks against healthcare systems and critical infrastructure that drew significant attention from law enforcement agencies. In January 2023, the FBI announced the successful disruption of Hive's operations, seizing their dark web leak sites and decryption keys, effectively dismantling the group's infrastructure and providing free decryption tools to victims. The group has been linked to 208 public disclosures across our corpus. First observed on a leak site on August 14, 2021; most recent post January 16, 2023. The operation is currently inactive.
Sector and geography
This disclosure adds to ransomware activity in the Government sector, which has 509 disclosures indexed across all operators we track. Geographically, City Of Huntsville, Texas is reported in United States, a country with 7,392 ransomware disclosures in our corpus.
How we know this. Darkfield monitors public ransomware leak sites continuously, archiving every new disclosure and the data later released against the victim. Each entry on this page is sourced from the operator's own publication and cross-checked against complementary OSINT feeds (RansomLook, ransomware.live, RansomWatch). We do not collect or host stolen data — only the metadata, timestamps and screenshots needed to make the public disclosure searchable and accountable. Records here are corrected when the original post is edited, retracted, or merged with another disclosure.