• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
u.s. offers $10 million bounty for info leading to arrest

U.S. Offers $10 Million Bounty for Info Leading to Arrest of Hive Ransomware Leaders

You are here: Home / General Cyber Security News / U.S. Offers $10 Million Bounty for Info Leading to Arrest of Hive Ransomware Leaders
February 12, 2024

The U.S. Office of Condition has declared financial benefits of up to $10 million for details about folks holding vital positions inside the Hive ransomware operation.

It is also providing absent an additional $5 million for specifics that could guide to the arrest and/or conviction of any man or woman “conspiring to participate in or making an attempt to participate in Hive ransomware exercise.”

The multi-million-greenback rewards appear a very little over a calendar year soon after a coordinated legislation enforcement effort covertly infiltrated and dismantled the darknet infrastructure connected with the Hive ransomware-as-a-provider (RaaS) gang. 1 particular person with suspected ties to the group was arrested in Paris in December 2023.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


Hive, which emerged in mid-2021, focused more than 1,500 victims in around 80 nations around the world, netting about $100 million in illegal revenues. In November 2023, Bitdefender disclosed that a new ransomware team termed Hunters Intercontinental had acquired the supply code and infrastructure from Hive to kick-begin its possess efforts.

There is some proof to counsel that the menace actors linked with Hunters International are likely dependent in Nigeria, specially an individual named Olowo Kehinde, for every information gathered by Netenrich security researcher Rakesh Krishnan, although it could also be a phony persona adopted by the actors to address up their correct origins.

Blockchain analytics agency Chainalysis, in its 2023 assessment revealed final 7 days, approximated that ransomware crews raked in $1.1 billion in extorted cryptocurrency payments from victims very last yr, when compared to $567 million in 2022, all but confirming that ransomware rebounded in 2023 pursuing a relative drop off in 2022.

“2023 marks a big comeback for ransomware, with history-breaking payments and a sizeable maximize in the scope and complexity of attacks — a substantial reversal from the drop noticed in 2022,” it stated.

Cybersecurity

The decline in ransomware action in 2022 has been considered a statistical aberration, with the downturn attributed to the Russo-Ukrainian war and the disruption of Hive. What’s much more, the total range of victims posted on data leak web sites in 2023 was 4,496, up from 3,048 in 2021 and 2,670 in 2022.

Palo Alto Networks Unit 42, in its possess investigation of ransomware gangs’ community listings of victims on dark web web-sites, identified as out manufacturing as the most impacted sector vertical in 2023, adopted by job and authorized services, significant technology, retail, construction, and health care sectors.

Even though the law enforcement action prevented close to $130 million in ransom payments to Hive, it can be said that the takedown also “probable impacted the broader activities of Hive affiliates, likely lessening the number of extra attacks they could have out.” In whole, the energy may possibly have averted at least $210.4 million in payments.

Including to the escalation in the regularity, scope, and quantity of attacks, final 12 months also witnessed a surge in new entrants and offshoots, a indication that the ransomware ecosystem is attracting a continuous stream of new players who are captivated by the prospect of high profits and lessen limitations to entry.

Cyber insurance policy company Corvus claimed the selection of lively ransomware gangs registered a “substantial” 34% raise amongst Q1 and Q4 2023, escalating from 35 to 47 either due to fracturing and rebranding or other actors acquiring keep of leaked encryptors. Twenty-5 new ransomware teams emerged in 2023.

“The frequency of rebranding, specifically among actors guiding the greatest and most notorious strains, is an vital reminder that the ransomware ecosystem is smaller than the substantial range of strains would make it appear,” Chainalysis explained.

Aside from a notable shift to significant activity hunting, which refers to the tactic of concentrating on really substantial firms to extract hefty ransoms, ransom payments are becoming steadily routed by way of cross-chain bridges, instant exchangers, and gambling services, indicating that e-criminal offense teams are slowly but surely transferring absent from centralized exchanges and mixers in pursuit of new avenues for revenue laundering.

Hive Ransomware Leaders

In November 2023, the U.S. Treasury Division imposed sanctions against Sinbad, a digital currency mixer that has been put to use by the North Korea-joined Lazarus Team to launder ill-gotten proceeds. Some of the other sanctioned mixers consist of Blender, Tornado Cash, and ChipMixer.

The pivot to large recreation hunting is also a consequence of businesses ever more refusing to settle, as the variety of victims who selected to shell out dropped to a new lower of 29% in the last quarter of 2023, in accordance to facts from Coveware.

“Yet another factor contributing to increased ransomware numbers in 2023 was a major change in danger actors’ use of vulnerabilities,” Corvus claimed, highlighting Cl0p’s exploitation of flaws in Fortra GoAnywhere and Development MOVEit Transfer.

Cybersecurity

“If malware, like infostealers, give a continual drip of new ransomware victims, then a major vulnerability is like turning on a faucet. With some vulnerabilities, somewhat simple access to 1000’s of victims can materialize seemingly right away.”

Cybersecurity corporation Recorded Upcoming discovered that ransomware groups’ weaponization of security vulnerabilities falls into two apparent categories: vulnerabilities that have only been exploited by a single or two groups and people that have been greatly exploited by a number of threat actors.

“Magniber has uniquely concentrated on Microsoft vulnerabilities, with half of its distinctive exploits concentrating on Windows Wise Monitor,” it mentioned. “Cl0p has uniquely and infamously concentrated on file transfer application from Accellion, SolarWinds, and MOVEit. ALPHV has uniquely centered on data backup application from Veritas and Veeam. REvil has uniquely concentrated on server computer software from Oracle, Atlassian, and Kaseya.”

Hive Ransomware Leaders

The ongoing adaptation noticed amid cybercrime crews is also evidenced in the uptick in DarkGate and PikaBot infections next the takedown of the QakBot malware network, which has been the most well-liked initial entry pathway into concentrate on networks for ransomware deployment.

“Ransomware teams this sort of as Cl0p have utilised zero-day exploits towards newly found out critical vulnerabilities, which symbolize a complicated problem for probable victims,” Device 42 said.

“When ransomware leak site info can provide precious perception on the menace landscape, this facts may not correctly replicate the full effect of a vulnerability. Companies ought to not only be vigilant about identified vulnerabilities, but they will have to also develop strategies to swiftly respond to and mitigate the effects of zero-day exploits.”

Found this report attention-grabbing? Observe us on Twitter  and LinkedIn to read through extra distinctive articles we article.


Some pieces of this short article are sourced from:
thehackernews.com

Previous Post: «u.s. doj dismantles warzone rat infrastructure, arrests key operators U.S. DoJ Dismantles Warzone RAT Infrastructure, Arrests Key Operators
Next Post: Microsoft Introduces Linux-Like ‘sudo’ Command to Windows 11 microsoft introduces linux like 'sudo' command to windows 11»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Qilin Ransomware Adds “Call Lawyer” Feature to Pressure Victims for Larger Ransoms
  • Iran’s State TV Hijacked Mid-Broadcast Amid Geopolitical Tensions; $90M Stolen in Crypto Heist
  • 6 Steps to 24/7 In-House SOC Success
  • Massive 7.3 Tbps DDoS Attack Delivers 37.4 TB in 45 Seconds, Targeting Hosting Provider
  • 67 Trojanized GitHub Repositories Found in Campaign Targeting Gamers and Developers
  • New Android Malware Surge Hits Devices via Overlays, Virtualization Fraud and NFC Theft
  • BlueNoroff Deepfake Zoom Scam Hits Crypto Employee with MacOS Backdoor Malware
  • Secure Vibe Coding: The Complete New Guide
  • Uncover LOTS Attacks Hiding in Trusted Tools — Learn How in This Free Expert Session
  • Russian APT29 Exploits Gmail App Passwords to Bypass 2FA in Targeted Phishing Campaign

Copyright © TheCyberSecurity.News, All Rights Reserved.