• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
hive ransomware upgrades to rust for more sophisticated encryption method

Hive Ransomware Upgrades to Rust for More Sophisticated Encryption Method

You are here: Home / General Cyber Security News / Hive Ransomware Upgrades to Rust for More Sophisticated Encryption Method
July 6, 2022

The operators of the Hive ransomware-as-a-service (RaaS) plan have overhauled their file-encrypting software to thoroughly migrate to Rust and adopt a more subtle encryption system.

“With its most current variant carrying several important upgrades, Hive also proves it is 1 of the swiftest evolving ransomware households, exemplifying the repeatedly altering ransomware ecosystem,” Microsoft Menace Intelligence Center (MSTIC) explained in a report on Tuesday.

Hive, which was very first observed in June 2021, has emerged as a person of the most prolific RaaS teams, accounting for 17 attacks in the thirty day period of May 2022 alone, along with Black Basta and Conti.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


The shift from GoLang to Rust tends to make Hive the next ransomware pressure following BlackCat to be prepared in the programming language, enabling the malware to acquire added gains these types of as memory security and further regulate around small-degree resources as properly as make use of a wide variety of cryptographic libraries.

What it also affords is the capability to render the malware resistant to reverse engineering, earning it much more evasive. Moreover, it arrives with characteristics to prevent providers and processes affiliated with security remedies that may perhaps quit it in its tracks.

Hive ransomware-as-a-service (RaaS)

Hive is no diverse from other ransomware family members in that it deletes backups to reduce restoration, but what is actually improved considerably in the new Rust-primarily based variant is its method to file encryption.

“In its place of embedding an encrypted critical in every file that it encrypts, it generates two sets of keys in memory, works by using them to encrypt files, and then encrypts and writes the sets to the root of the generate it encrypts, both of those with .crucial extension,” MSTIC stated.

CyberSecurity

To decide which of the two keys is made use of for locking a specific file, an encrypted file is renamed to consist of the file name that contains the critical that is then adopted by an underscore and a Base64-encoded string (e.g., “C:myphoto.jpg.l0Zn68cb _ -B82BhIaGhI8”) that points to two distinct locations in the corresponding .essential file.

The conclusions come as the danger actor driving the lesser-regarded AstraLocker ransomware ceased functions and released a decryption software as section of a change to crytojacking, Bleeping Personal computer described this 7 days.

But in an indicator that the cybercriminal landscape is in continuous flux, cybersecurity researchers have found out a new ransomware family called RedAlert (aka N13V) that is capable of concentrating on the two Windows and Linux VMWare ESXi servers.

Discovered this short article interesting? Stick to THN on Fb, Twitter  and LinkedIn to read more exclusive information we put up.


Some pieces of this post are sourced from:
thehackernews.com

Previous Post: «Cyber Security News TikTok CEO Addresses US Security Concern
Next Post: An EDR buyer’s guide an edr buyer's guide»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Cybercriminals Using New ASMCrypt Malware Loader Flying Under the Radar
  • Lazarus Group Impersonates Recruiter from Meta to Target Spanish Aerospace Firm
  • Post-Quantum Cryptography: Finally Real in Consumer Apps?
  • Microsoft’s AI-Powered Bing Chat Ads May Lead Users to Malware-Distributing Sites
  • Progress Software Releases Urgent Hotfixes for Multiple Security Flaws in WS_FTP Server
  • Cisco Warns of Vulnerability in IOS and IOS XE Software After Exploitation Attempts
  • GitHub Repositories Hit by Password-Stealing Commits Disguised as Dependabot Contributions
  • China’s BlackTech Hacking Group Exploited Routers to Target U.S. and Japanese Companies
  • The Dark Side of Browser Isolation – and the Next Generation Browser Security Technologies
  • China-Linked Budworm Targeting Middle Eastern Telco and Asian Government Agencies

Copyright © TheCyberSecurity.News, All Rights Reserved.