• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
is this the end of the road for ransomware?

Microsoft identifies sophisticated Hive ransomware variant written in Rust

You are here: Home / General Cyber Security News / Microsoft identifies sophisticated Hive ransomware variant written in Rust
July 6, 2022

Shutterstock

The threat actors driving Hive ransomware have designed major adjustments to the payload in a new variant uncovered by Microsoft Menace Intelligence Centre (MSTIC).

Most noteworthy amid the updates is the migration of the ransomware’s code to a new language, and the work of a much more innovative encryption technique.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


These adjustments provide the ransomware with improved handle above minimal-stage means, a much more consumer-pleasant syntax for threat actors and a structure extra conducive to economical encryption.

The new encryption system suggests sure countermeasures against Hive have turn into much less productive. Instead of embedding an encrypted crucial in every single file that the payload influences, the new variant employs a novel strategy of encryption that is much harder to remedy.

MSTIC describes that it “generates two sets of keys in memory, takes advantage of them to encrypt data files, and then encrypts and writes the sets to the root of the travel it encrypts, the two with .crucial extension.”

MSTIC also warns that the new variant does not have the ‘help’ menu available for attackers in previous variations, which indicates that although attackers will have to now memorise parameters them selves, it also tends to make the undertaking of getting parameters more difficult for security researchers.

Hive ransomware was first learned in June 2021, and considering that has been applied for various attacks such as that suffered not long ago by the Costa Rican health care services. Like other ransomware, at the time deployed its payload functions to disable process processes and services that may incorporate it or enable the sufferer to prevent it from encrypting key documents. 

It also deletes backups to protect against the sufferer from securely recovering their files, and then generates a ransom note in basic textual content structure. MSTIC credits it with big-scale attacks in the computer software and healthcare sectors.

An additional piece of ransomware coded in Rust, known as BlackCat, was flagged by the FBI before this yr as owning breached around 60 organisations around the globe.

Ransomware-as-a-support (RaaS) versions, in which risk actors lease ransomware application from destructive builders relatively than building and deploying their possess computer software, are increasingly well-liked and threatening to businesses.

In the Sophos 2022 Risk Report, the security business asserts that going forward, “the RaaS company product will continue on to dominate the risk landscape for ransomware attacks, as this product permits industry experts in ransomware design to continue to build and enhance their product whilst offering gurus in “initial access” break-ins the means to focus on this endeavor with raising intensity.”


Some sections of this short article are sourced from:
www.itpro.co.uk

Previous Post: «southwest health center hit by data breach Southwest Health Center hit by data breach
Next Post: Hive Ransomware Upgraded to Rust to Deliver More Sophisticated Encryption Cyber Security News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.