Monday, April 28, 2025
Homecyber securityHunters International Linked to Hive Ransomware in Attacks on Windows, Linux, and...

Hunters International Linked to Hive Ransomware in Attacks on Windows, Linux, and ESXi Systems

Published on

SIEM as a Service

Follow Us on Google News

Hunters International, a ransomware group suspected to be a rebrand of the infamous Hive ransomware, has been linked to widespread attacks targeting Windows, Linux, FreeBSD, SunOS, and ESXi systems.

Emerging in October 2023, the group has gained notoriety for its sophisticated techniques in data exfiltration and extortion.

Cybersecurity researchers have noted similarities between Hunters International’s operations and those of Hive, which was dismantled by law enforcement earlier in 2023.

- Advertisement - Google News

While Hunters International denies being a direct continuation of Hive, evidence suggests that they acquired Hive’s source code and operational tools.

Advanced Techniques and Expanding Targets

The ransomware developed by Hunters International is compatible with multiple architectures (x64, x86, ARM) and operating systems, showcasing its adaptability.

Unlike traditional ransomware attacks that rely heavily on encryption and ransom notes, Hunters International has shifted its focus to stealthier methods.

The latest versions of their malware avoid renaming encrypted files or dropping ransom notes a tactic aimed at minimizing awareness within victim organizations.

Additionally, the group leverages Open Source Intelligence (OSINT) techniques to pressure victims through phone calls, emails, and social media.

Hunters International targets industries such as healthcare, real estate, and professional services across North America, Europe, and Asia.

Despite publicly prohibiting attacks on regions like Israel, Turkey, and the Far East, data leaks suggest that these rules are inconsistently enforced.

Hunters International
Hunters International’s data leak site

Transition to Extortion-Only Operations

In November 2024, Hunters International announced plans to cease operations due to increased scrutiny from governments and diminishing profitability.

However, by January 2025, the group resurfaced under the name “World Leaks,” focusing exclusively on extortion without encryption.

World Leaks employs a custom exfiltration tool designed for automating data theft from victims’ networks.

Hunters International
The home page of Hunters International’s affiliate panel.

This shift aligns with broader trends in cybercrime where ransomware operators increasingly favor extortion-only attacks over double extortion methods.

Hunters International’s ransomware is built using Rust programming language for enhanced performance and cross-platform compatibility.

It employs AES encryption with randomly generated keys for each file while avoiding encrypting specific file sections to evade detection.

The malware also disables system recovery features and terminates critical processes using predefined lists.

For Unix-like systems and ESXi hypervisors, the ransomware offers limited control but retains its ability to encrypt virtual machine files.

The group’s infrastructure includes tools like “Storage Software,” which organizes stolen data for extortion purposes.

According to the Report, this software enables victims to download or delete their files after paying the ransom a feature aimed at streamlining negotiations while maintaining operational security for the attackers.

The evolution of Hunters International reflects significant changes in the ransomware landscape.

As governments worldwide intensify efforts against cybercrime including banning ransom payments groups like Hunters International are adapting by adopting stealthier tactics and focusing on critical infrastructure targets.

The transition to extortion-only operations further underscores the need for robust cybersecurity measures to protect sensitive data from exfiltration attacks.

Find this News Interesting! Follow us on Google NewsLinkedIn, & X to Get Instant Updates!

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

China Claims U.S. Cyberattack Targeted Leading Encryption Company

China has accused U.S. intelligence agencies of carrying out a sophisticated cyberattack against one...

Critical FastCGI Library Flaw Exposes Embedded Devices to Code Execution

A severe vulnerability (CVE-2025-23016) in the FastCGI library-a core component of lightweight web server...

Viasat Modems Zero-Day Vulnerabilities Let Attackers Execute Remote Code

A severe zero-day vulnerability has been uncovered in multiple Viasat satellite modem models, including...

Obfuscation Techniques: A Key Weapon in the Ongoing War Between Hackers and Defenders

Obfuscation stands as a powerful weapon for attackers seeking to shield their malicious code...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

China Claims U.S. Cyberattack Targeted Leading Encryption Company

China has accused U.S. intelligence agencies of carrying out a sophisticated cyberattack against one...

Critical FastCGI Library Flaw Exposes Embedded Devices to Code Execution

A severe vulnerability (CVE-2025-23016) in the FastCGI library-a core component of lightweight web server...

Viasat Modems Zero-Day Vulnerabilities Let Attackers Execute Remote Code

A severe zero-day vulnerability has been uncovered in multiple Viasat satellite modem models, including...