Wednesday, April 16, 2025
Homecyber securityHunters International Linked to Hive Ransomware in Attacks on Windows, Linux, and...

Hunters International Linked to Hive Ransomware in Attacks on Windows, Linux, and ESXi Systems

Published on

SIEM as a Service

Follow Us on Google News

Hunters International, a ransomware group suspected to be a rebrand of the infamous Hive ransomware, has been linked to widespread attacks targeting Windows, Linux, FreeBSD, SunOS, and ESXi systems.

Emerging in October 2023, the group has gained notoriety for its sophisticated techniques in data exfiltration and extortion.

Cybersecurity researchers have noted similarities between Hunters International’s operations and those of Hive, which was dismantled by law enforcement earlier in 2023.

- Advertisement - Google News

While Hunters International denies being a direct continuation of Hive, evidence suggests that they acquired Hive’s source code and operational tools.

Advanced Techniques and Expanding Targets

The ransomware developed by Hunters International is compatible with multiple architectures (x64, x86, ARM) and operating systems, showcasing its adaptability.

Unlike traditional ransomware attacks that rely heavily on encryption and ransom notes, Hunters International has shifted its focus to stealthier methods.

The latest versions of their malware avoid renaming encrypted files or dropping ransom notes a tactic aimed at minimizing awareness within victim organizations.

Additionally, the group leverages Open Source Intelligence (OSINT) techniques to pressure victims through phone calls, emails, and social media.

Hunters International targets industries such as healthcare, real estate, and professional services across North America, Europe, and Asia.

Despite publicly prohibiting attacks on regions like Israel, Turkey, and the Far East, data leaks suggest that these rules are inconsistently enforced.

Hunters International
Hunters International’s data leak site

Transition to Extortion-Only Operations

In November 2024, Hunters International announced plans to cease operations due to increased scrutiny from governments and diminishing profitability.

However, by January 2025, the group resurfaced under the name “World Leaks,” focusing exclusively on extortion without encryption.

World Leaks employs a custom exfiltration tool designed for automating data theft from victims’ networks.

Hunters International
The home page of Hunters International’s affiliate panel.

This shift aligns with broader trends in cybercrime where ransomware operators increasingly favor extortion-only attacks over double extortion methods.

Hunters International’s ransomware is built using Rust programming language for enhanced performance and cross-platform compatibility.

It employs AES encryption with randomly generated keys for each file while avoiding encrypting specific file sections to evade detection.

The malware also disables system recovery features and terminates critical processes using predefined lists.

For Unix-like systems and ESXi hypervisors, the ransomware offers limited control but retains its ability to encrypt virtual machine files.

The group’s infrastructure includes tools like “Storage Software,” which organizes stolen data for extortion purposes.

According to the Report, this software enables victims to download or delete their files after paying the ransom a feature aimed at streamlining negotiations while maintaining operational security for the attackers.

The evolution of Hunters International reflects significant changes in the ransomware landscape.

As governments worldwide intensify efforts against cybercrime including banning ransom payments groups like Hunters International are adapting by adopting stealthier tactics and focusing on critical infrastructure targets.

The transition to extortion-only operations further underscores the need for robust cybersecurity measures to protect sensitive data from exfiltration attacks.

Find this News Interesting! Follow us on Google NewsLinkedIn, & X to Get Instant Updates!

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Interlock Ransomware Uses Multi-Stage Attack Through Legitimate Websites to Deliver Malicious Browser Updates

The Interlock ransomware intrusion set has escalated its operations across North America and Europe...

Researchers Expose Medusa Ransomware Group’s Onion Site

Researchers have successfully infiltrated the digital fortress of one of the most prolific ransomware...

CISA Extends Support a Last Minute to CVE Program, Averting Global Cybersecurity Crisis

CISA announced an eleventh-hour contract extension with MITRE Corporation to maintain the Common Vulnerabilities...

Hackers Target Investors Through Fraud Networks to Steal Financial Data

Hackers have launched sophisticated schemes designed to defraud investors and steal their financial data....

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Interlock Ransomware Uses Multi-Stage Attack Through Legitimate Websites to Deliver Malicious Browser Updates

The Interlock ransomware intrusion set has escalated its operations across North America and Europe...

Researchers Expose Medusa Ransomware Group’s Onion Site

Researchers have successfully infiltrated the digital fortress of one of the most prolific ransomware...

CISA Extends Support a Last Minute to CVE Program, Averting Global Cybersecurity Crisis

CISA announced an eleventh-hour contract extension with MITRE Corporation to maintain the Common Vulnerabilities...