{"id":6922,"date":"2021-08-30T16:23:24","date_gmt":"2021-08-30T23:23:24","guid":{"rendered":"https:\/\/blogs.infoblox.com\/?p=6922"},"modified":"2024-08-07T12:20:03","modified_gmt":"2024-08-07T19:20:03","slug":"hive-ransomware","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory\/hive-ransomware\/","title":{"rendered":"Hive Ransomware"},"content":{"rendered":"<h3><strong>Author: Christopher Kim<\/strong><\/h3>\n<p>&nbsp;<\/p>\n<h3>1. Executive Summary<\/h3>\n<p>On 25 August, the Federal Bureau of Investigation (FBI) released a flash alert that describes the Hive ransomware and related indicators of compromise (IOCs).<sup>1<\/sup> According to the flash alert, Hive was discovered in June 2021 and likely operates as an affiliate-based ransomware.<sup>2<\/sup> It uses common ransomware tactics, techniques, and procedures (TTPs) to compromise victims\u2019 machines, bypass anti-malware, and then steal sensitive data and encrypt system files. In addition, Hive leaves an unencrypted, plain-text note that threatens to leak the victim\u2019s data on the TOR website HiveLeaks unless the victim pays a ransom. This behavior is consistent with the recent trend wherein many ransomware campaigns attempt to extort victims and most exfiltrate data.<sup>3, 4<\/sup><\/p>\n<h3>2. Analysis<\/h3>\n<p>To gain a foothold in a victim\u2019s network, Hive uses spear-phishing emails with attachments. Upon obtaining the user\u2019s network credentials, Hive attempts to infect the network laterally, by using the Remote Desktop Protocol (RDP).<\/p>\n<p>To avoid anti-malware defenses, Hive terminates computer backup and restore, antivirus and antispyware, and file copying. After encrypting files and saving them with a .hive extension, Hive creates batch files hive.bat and shadow.bat, which contain commands for the computer to delete the Hive executable, disc backup copies or snapshots, and the batch files. This is a common technique used by malware to reduce available forensic evidence.<\/p>\n<p>Finally, Hive drops a ransom note, HOW_TO_DECRYPT.txt, into each affected directory. The note explains that encrypted files are not decryptable without the master key, which is in the actors\u2019 possession. In addition, the note contains the login details for the TOR website that the victim can use to pay the ransom, and it threatens to leak the victim\u2019s sensitive data on the HiveLeaks TOR website.<\/p>\n<p>In some attacks, in addition to offering live chat on their TOR website, the actors have called the victims directly and demanded a payment in return for the master key. Payment deadlines range from 2 to 6 days, but in some incidents, the actors prolonged the deadline after establishing communication with the victim company.<\/p>\n<h3>3. Prevention and Mitigation<\/h3>\n<p>The FBI discourage victims from paying ransom; submitting to the demands of threat actors not only enriches them but also incentivizes them to continue their malicious campaigns. In addition, paying ransom does not guarantee that victims would recover their files and would not come under another attack from the same actors. Victims should carefully evaluate all options to protect their shareholders, employees, and customers. The FBI recommend the following actions for mitigation and prevention of ransomware attacks:<\/p>\n<ul>\n<li>Back-up critical data offline.<\/li>\n<li>Ensure copies of critical data are in the cloud or on an external hard drive or storage device.<\/li>\n<li>Secure back-ups and ensure data are not accessible for modification or deletion from the system where the data resides.<\/li>\n<li>Use two-factor authentication with strong passwords, including for remote access services.<\/li>\n<li>Monitor cyber threat reporting regarding the publication of compromised VPN login credentials and change passwords\/settings if applicable.<\/li>\n<li>Keep computers, devices, and applications patched and up-to-date.<\/li>\n<li>Install and regularly update anti-virus or anti-malware software on all hosts.<\/li>\n<li>Review the following additional resources.\n<ul>\n<li>The joint advisory from Australia, Canada, New Zealand, the United Kingdom, and the United States on <strong><a href=\"https:\/\/us-cert.cisa.gov\/ncas\/alerts\/aa20-245a\" target=\"_blank\" rel=\"noopener noreferrer\">Technical Approaches to Uncovering and Remediating Malicious Activity<\/a><\/strong> provides additional guidance when hunting or investigating a network and common mistakes to avoid in incident handling.<\/li>\n<li>The Cybersecurity and Infrastructure Security Agency-Multi-State Information Sharing &amp; Analysis Center <a href=\"https:\/\/www.cisa.gov\/stopransomware\/ransomware-guide\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>Joint Ransomware Guide<\/strong><\/a> covers additional best practices and ways to prevent, protect, and respond to a ransomware attack.<\/li>\n<li><a href=\"https:\/\/www.cisa.gov\/stopransomware\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>StopRansomware.gov<\/strong><\/a> is the U.S. Government\u2019s official one-stop location for resources to tackle ransomware more effectively.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>The FBI and the Cybersecurity and Infrastructure Security Agency (CISA) recommend the following actions for organizations that have fallen victim to ransomware attacks:<\/p>\n<ul>\n<li>Isolate the infected system. Remove the infected system from all networks, and disable the computer\u2019s wireless, Bluetooth, and any other potential networking capabilities. Ensure all shared and networked drives are disconnected, whether wired or wireless.<\/li>\n<li>Turn off other computers and devices. Power-off and segregate (i.e., remove from the network) the infected computer(s). Power-off and segregate any other computers or devices that share a network with the infected computer(s) that have not been fully encrypted by ransomware. If possible, collect and secure all infected and potentially infected computers and devices in a central location, making sure to clearly label any computers that have been encrypted. Powering-off and segregating infected computers and computers that have not been fully encrypted may allow for the recovery of partially encrypted files by specialists.<\/li>\n<li>Secure backups. Ensure that backup data is offline and secure. If possible, scan backup data with an antivirus program to check that it is free of malware.<\/li>\n<\/ul>\n<h3>4. Sample Ransom Note<\/h3>\n<p>A typical ransom note sent by Hive contains text similar to the following. To protect the public, the FBI have redacted some of the information.<\/p>\n<table>\n<tbody>\n<tr>\n<td>Your network has been breached and all data were encrypted.<br \/>\nPersonal data, financial reports and important documents are ready to disclose.To decrypt all the data or to prevent exfiltrated files to be disclosed at<br \/>\nhttp:\/\/hiveleakdbtnp76ulyhi52eag6c6tyc3xw7ez7iqy6wc34gd2nekazyd.onion\/<br \/>\nyou will need to purchase our decryption software.Please contact our sales department at:<\/p>\n<p>REDACTED<\/p>\n<p>Login: REDACTED<br \/>\nPassword: REDACTED<\/p>\n<p>To get access to .onion websites download and install Tor Browser at:<br \/>\nhttps:\/\/www.torproject.org\/ (Tor Browser is not related to us)<\/p>\n<p>Follow the guidelines below to avoid losing your data:<\/p>\n<p>&#8211; Do not shutdown or reboot your computers, unmount external storages.<br \/>\n&#8211; Do not try to decrypt data using third party software. It may cause<br \/>\nirreversible damage.<br \/>\n&#8211; Do not fool yourself. Encryption has perfect secrecy and it&#8217;s impossible<br \/>\nto decrypt without knowing the key.<br \/>\n&#8211; Do not modify, rename or delete *.key.k6thw files. Your<br \/>\ndata will be undecryptable.<br \/>\n&#8211; Do not modify or rename encrypted files. You will lose them.<br \/>\n&#8211; Do not report to authorities. The negotiation process will be terminated<br \/>\nimmediately and the key will be erased.<br \/>\n&#8211; Do not reject to purchase. Your sensitive data will be publicly disclosed.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h3>5. Indicators of Compromise<\/h3>\n<p>The FBI have identified the following IOCs from previous Hive ransomware campaigns. Some of these IOCs are used by legitimate applications and are not inherently malicious. The FBI recommend removing all applications not deemed necessary for day-to-day operations.<\/p>\n<table>\n<tbody>\n<tr>\n<th style=\"border: 1px solid black; background-color: lightgray; text-align: center;padding-top:10px;\">Indicators<\/th>\n<th style=\"border: 1px solid black; background-color: lightgray; text-align: center;padding-top:10px;padding-right:10px;\">Description<\/th>\n<\/tr>\n<tr>\n<td>http:\/\/hiveleakdbtnp76ulyhi52eag6c6tyc3xw7ez7iqy6wc34gd2nekazyd[.]onion<br \/>\nhiveleakdbtnp76ulyhi52eag6c6tyc3xw7ez7iqy6wc34gd2nekazyd[.]onion<\/td>\n<td>HiveLeaks TOR website<\/td>\n<\/tr>\n<tr>\n<td>321d0c4f1bbb44c53cd02186107a18b7a44c840a9a5f0a78bdac06868136b72c<\/td>\n<td>Winlo.exe SHA256<\/td>\n<\/tr>\n<tr>\n<td>04FB3AE7F05C8BC333125972BA907398<\/td>\n<td>7zG.exe MD5<\/td>\n<\/tr>\n<tr>\n<td>BEE9BA70F36FF250B31A6FDF7FA8AFEB<\/td>\n<td>Winlo_dump_64_SCY.exe<\/td>\n<\/tr>\n<tr>\n<td>HOW_TO_DECRYPT.txt<\/td>\n<td>Ransom note filename<\/td>\n<\/tr>\n<tr>\n<td>hive.bat<br \/>\nshadow.bat<\/td>\n<td>Self-delete batch filenames<\/td>\n<\/tr>\n<tr>\n<td>https:\/\/anonfiles[.]com<br \/>\nhttps:\/\/mega[.]nz<br \/>\nhttps:\/\/send[.]exploit[.]in<br \/>\nhttps:\/\/ufile[.]io<br \/>\nhttps:\/\/www.sendspace[.]com<\/td>\n<td>Links for anonymous sharing of files<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h3>Endnotes<\/h3>\n<ol>\n<li><a href=\"https:\/\/www.ic3.gov\/Media\/News\/2021\/210825.pdf\" target=\"&quot;\" rel=\"noopener noreferrer\"><strong>https:\/\/www.ic3.gov\/Media\/News\/2021\/210825.pdf<\/strong><\/a><\/li>\n<li>A ransomware affiliate refers to a person or group who rents access to Ransomware-as-a-Service (RaaS) platforms.<\/li>\n<li><a href=\"https:\/\/www.crypsisgroup.com\/insights\/ransomwares-new-trend-exfiltration-and-extortion\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>https:\/\/www.crypsisgroup.com\/insights\/ransomwares-new-trend-exfiltration-and-extortion<\/strong><\/a><\/li>\n<li><a href=\"https:\/\/healthitsecurity.com\/news\/70-ransomware-attacks-cause-data-exfiltration-phishing-top-entry-point\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>https:\/\/healthitsecurity.com\/news\/70-ransomware-attacks-cause-data-exfiltration-phishing-top-entry-point<\/strong><\/a><\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>Author: Christopher Kim &nbsp; 1. Executive Summary On 25 August, the Federal Bureau of Investigation (FBI) released a flash alert that describes the Hive ransomware and related indicators of compromise (IOCs).1 According to the flash alert, Hive was discovered in June 2021 and likely operates as an affiliate-based ransomware.2 It uses common ransomware tactics, techniques, [&hellip;]<\/p>\n","protected":false},"author":397,"featured_media":6933,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[554],"tags":[236,488,294,40,189],"class_list":{"0":"post-6922","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-threat-advisory","8":"tag-cyberthreat","9":"tag-cyberthreat-intelligence-report","10":"tag-malspam","11":"tag-threat-intelligence","12":"tag-cybersecurity","13":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Hive Ransomware Identified by FBI | Cyber Campaign Brief<\/title>\n<meta name=\"description\" content=\"Infoblox learned of a ransomware activity that was discovered on June of 2021. Learn more about the campaign that extorted the exfiltrate data of victims here.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory\/hive-ransomware\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hive Ransomware\" \/>\n<meta property=\"og:description\" content=\"Infoblox learned of a ransomware activity that was discovered on June of 2021. Learn more about the campaign that extorted the exfiltrate data of victims here.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory\/hive-ransomware\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2021-08-30T23:23:24+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-08-07T19:20:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/hive-ransomware.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"612\" \/>\n\t<meta property=\"og:image:height\" content=\"363\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Infoblox Threat Intel\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Infoblox Threat Intel\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-threat-advisory\\\/hive-ransomware\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-threat-advisory\\\/hive-ransomware\\\/\"},\"author\":{\"name\":\"Infoblox Threat Intel\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/b6aed8965e3298a0817c16d32c0a67ae\"},\"headline\":\"Hive Ransomware\",\"datePublished\":\"2021-08-30T23:23:24+00:00\",\"dateModified\":\"2024-08-07T19:20:03+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-threat-advisory\\\/hive-ransomware\\\/\"},\"wordCount\":1207,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-threat-advisory\\\/hive-ransomware\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/hive-ransomware.jpg\",\"keywords\":[\"Cyberthreat\",\"Cyberthreat intelligence report\",\"Malspam\",\"Threat Intelligence\",\"Cybersecurity\"],\"articleSection\":[\"Cyber Threat Advisory\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-threat-advisory\\\/hive-ransomware\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-threat-advisory\\\/hive-ransomware\\\/\",\"name\":\"Hive Ransomware Identified by FBI | Cyber Campaign Brief\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-threat-advisory\\\/hive-ransomware\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-threat-advisory\\\/hive-ransomware\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/hive-ransomware.jpg\",\"datePublished\":\"2021-08-30T23:23:24+00:00\",\"dateModified\":\"2024-08-07T19:20:03+00:00\",\"description\":\"Infoblox learned of a ransomware activity that was discovered on June of 2021. Learn more about the campaign that extorted the exfiltrate data of victims here.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-threat-advisory\\\/hive-ransomware\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-threat-advisory\\\/hive-ransomware\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-threat-advisory\\\/hive-ransomware\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/hive-ransomware.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/hive-ransomware.jpg\",\"width\":612,\"height\":363,\"caption\":\"Virus detected alert. Camera moves around hud display and man typing keyboard. Cyber security breach warning with worm symbol on screen. System protection futuristic concept.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-threat-advisory\\\/hive-ransomware\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Infoblox Threat Intel\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/threat-intelligence\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Threat Advisory\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/threat-intelligence\\\/cyber-threat-advisory\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Hive Ransomware\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/b6aed8965e3298a0817c16d32c0a67ae\",\"name\":\"Infoblox Threat Intel\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_397_1714162589-96x96.png\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_397_1714162589-96x96.png\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_397_1714162589-96x96.png\",\"caption\":\"Infoblox Threat Intel\"},\"description\":\"Infoblox Threat Intel is the leading creator of original DNS threat intelligence, distinguishing itself in a sea of aggregators. What sets us apart? Two things: mad DNS skills and unparalleled visibility. DNS is notoriously tricky to interpret and hunt from, but our deep understanding and unique access to the internet's inner workings allow us to track down threat actors that others can't see. We're proactive, not just defensive, using our insights to disrupt cybercrime where it begins. We also believe in sharing knowledge to support the broader security community by publishing detailed research and releasing indicators on GitHub. In addition, our intel is seamlessly integrated into our Infoblox Protective DNS solutions, so customers automatically get its benefits, along with ridiculously low false positive rates.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/infoblox-threat-intel\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Hive Ransomware Identified by FBI | Cyber Campaign Brief","description":"Infoblox learned of a ransomware activity that was discovered on June of 2021. Learn more about the campaign that extorted the exfiltrate data of victims here.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory\/hive-ransomware\/","og_locale":"en_US","og_type":"article","og_title":"Hive Ransomware","og_description":"Infoblox learned of a ransomware activity that was discovered on June of 2021. Learn more about the campaign that extorted the exfiltrate data of victims here.","og_url":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory\/hive-ransomware\/","og_site_name":"Infoblox Blog","article_published_time":"2021-08-30T23:23:24+00:00","article_modified_time":"2024-08-07T19:20:03+00:00","og_image":[{"width":612,"height":363,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/hive-ransomware.jpg","type":"image\/jpeg"}],"author":"Infoblox Threat Intel","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Infoblox Threat Intel","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory\/hive-ransomware\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory\/hive-ransomware\/"},"author":{"name":"Infoblox Threat Intel","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/b6aed8965e3298a0817c16d32c0a67ae"},"headline":"Hive Ransomware","datePublished":"2021-08-30T23:23:24+00:00","dateModified":"2024-08-07T19:20:03+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory\/hive-ransomware\/"},"wordCount":1207,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory\/hive-ransomware\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/hive-ransomware.jpg","keywords":["Cyberthreat","Cyberthreat intelligence report","Malspam","Threat Intelligence","Cybersecurity"],"articleSection":["Cyber Threat Advisory"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory\/hive-ransomware\/","url":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory\/hive-ransomware\/","name":"Hive Ransomware Identified by FBI | Cyber Campaign Brief","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory\/hive-ransomware\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory\/hive-ransomware\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/hive-ransomware.jpg","datePublished":"2021-08-30T23:23:24+00:00","dateModified":"2024-08-07T19:20:03+00:00","description":"Infoblox learned of a ransomware activity that was discovered on June of 2021. Learn more about the campaign that extorted the exfiltrate data of victims here.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory\/hive-ransomware\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory\/hive-ransomware\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory\/hive-ransomware\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/hive-ransomware.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/hive-ransomware.jpg","width":612,"height":363,"caption":"Virus detected alert. Camera moves around hud display and man typing keyboard. Cyber security breach warning with worm symbol on screen. System protection futuristic concept."},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory\/hive-ransomware\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Infoblox Threat Intel","item":"https:\/\/www.infoblox.com\/blog\/category\/threat-intelligence\/"},{"@type":"ListItem","position":3,"name":"Cyber Threat Advisory","item":"https:\/\/www.infoblox.com\/blog\/category\/threat-intelligence\/cyber-threat-advisory\/"},{"@type":"ListItem","position":4,"name":"Hive Ransomware"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/b6aed8965e3298a0817c16d32c0a67ae","name":"Infoblox Threat Intel","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_397_1714162589-96x96.png","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_397_1714162589-96x96.png","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_397_1714162589-96x96.png","caption":"Infoblox Threat Intel"},"description":"Infoblox Threat Intel is the leading creator of original DNS threat intelligence, distinguishing itself in a sea of aggregators. What sets us apart? Two things: mad DNS skills and unparalleled visibility. DNS is notoriously tricky to interpret and hunt from, but our deep understanding and unique access to the internet's inner workings allow us to track down threat actors that others can't see. We're proactive, not just defensive, using our insights to disrupt cybercrime where it begins. We also believe in sharing knowledge to support the broader security community by publishing detailed research and releasing indicators on GitHub. In addition, our intel is seamlessly integrated into our Infoblox Protective DNS solutions, so customers automatically get its benefits, along with ridiculously low false positive rates.","url":"https:\/\/www.infoblox.com\/blog\/author\/infoblox-threat-intel\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/6922","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/397"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=6922"}],"version-history":[{"count":6,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/6922\/revisions"}],"predecessor-version":[{"id":8148,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/6922\/revisions\/8148"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/6933"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=6922"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=6922"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=6922"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}