Press ESC to close

Ransomware Group called Hunters Claims attack for Mantinga.

CategoryDetails
Threat ActorsHunters International ( Acquired the Hive source code and website from the Original Developers. )
Campaign OverviewLatest Campaign includes MANTINGA, based in Lithuania, specializes in food and beverage manufacturing , has fallen victim to HUNTERS INTERNATIONAL Ransomware .
Target Regions (Or Victims)Lithuania , Argentina , Sweden , Germany , Taiwan , USA .
MethodologyMalware encrypts data using AES with RSA for key protection, Escalates Privileges, Terminates Processes, and Exfiltrates Data to Force payment.
Product TargetedSensitive organizational data, backup systems, and critical services.
Malware ReferenceCustom ransomware derived from Hive’s source code, written in Rust.
Tools UsedEncryption tools like AES, RSA, ChaCha20-Poly1305 (earlier versions), SHA3-256 hashing, tools to bypass backups (vssadmin.exe, wmic.exe, etc.).
Vulnerabilities ExploitedNo specific vulnerabilities mentioned; uses privilege escalation (SE_DEBUG), process impersonation, and service termination to gain control.
TTPsPrivilege escalation, Terminating processes and services, Encrypting files, Wiping free space, and leaving a ransom note in all Encrypted folders.
AttributionSelf-attributed to Hunters International group, no External links to other actors like Hive.
RecommendationsEnhance backup systems, restrict privileged access, use endpoint detection, and monitor for signs of data exfiltration or unusual process activity.
Source Acronis.com , itfunk.org

Sources: https://www.acronis.com/en-sg/cyber-protection-center/posts/hunters-international-new-ransomware-based-on-hive-source-code/

https://www.itfunk.org/cyber-threats/ransomware/hunters-international-ransomhuntersint-hive-variant/

Leave a Reply

Your email address will not be published. Required fields are marked *