Accessibility links
  • Skip to main content
News Icon NEWS FILTER
All News Scams & Phishing Security Education Videos Mobile Security Your Security Education Identity Theft Corporate Security
Search Icon SEARCH
 

Email Icon SUBSCRIBE TO WEEKLY NEWSLETTER
FBI Stops Hive Ransomware Group From Further Attacks
Facebook   X   LinkedIn   Email

FBI Stops Hive Ransomware Group From Further Attacks

February 3, 2023

According to FBI information, Hive ransomware actors had been highly active in the recent past. As of November 2022, they had managed to attack more than 1,300 companies worldwide and receive approximately $100 million as a part of ransom payments. As a result, the HHS, CISA, and FBI came together to issue a joint announcement to warn businesses of the Hive activity; and then they stopped them and prevented many organizations from being victims by taking the hacking group down.

The announcement mentioned that the Hive actors (a ransomware-as-a-service group) use a unique ransomware that allow developers to not only develop the malware, but also maintain and update it from time to time.

The attacks of note primarily took place between June 2021 through at least November 2022 where the threat actors used ransomware to attack a wide range of infrastructure sectors and different businesses. Some of the most critical infrastructure sectors included Information Technology, Critical Manufacturing, Healthcare, and Public Health, Communications, and Government Facilities.

Well, there is some good news to report after this. FBI have since announced they, along with international law enforcement agencies, were able to hack the group, break into their systems, and steal the digital keys the hacking group used to unlock their victims’ data after locking them up. This meant that the victims were not obligated to pay up. The FBI warned them in advance, or in the case of a school district and a hospital, the agency provided them the decryption keys.

In the announcement at the end of 2022, Hive actors began using single-factor logins with the help of virtual private networks (VPNs), Remote Desktop Protocol (RDP), and other types of remote network connection protocols to get access to the victim’s networks. They used that information to get access to multifactor authentication and enter FortiOS servers of many business accounts. When they enter these servers, they get access to critical business information without requiring a second authentication factor. Once access is gained, they identified the backup-related processes, antivirus information, terminate the volume copy shadow services, and even delete Windows events logs, especially the System, Security, and Application logs. They used such strategies to target more than 1,500 victims globally, according to the FBI.

While the threat from Hive is off the table for the time being, there are many other similar groups performing similar attacks. It remains important to perform regular backups of critical information, keep them off the network, and make sure they are working so they are ready if they are ever needed. In addition, make sure all employees know the signs of phishing. Generally, that is how ransomware makes its way into the network in the first place.

Whenever hacking groups are taken down, it’s good news. It’s also worth noting that they are unlikely to just go away. In fact, they have options. They may regroup under a different identity or the members may go join other groups. Sadly, the individuals were not identified in this and rarely are. So, even though law enforcement deserves kudos, it doesn’t make the threats go away. However, there is one less such cybersecurity threat…for now.


BOLO for These Most Dangerous Email Attachments

Scams & Phishing

BOLO for These Most Dangerous Email Attachments

Keeping a lookout for suspicious emails has become a daily consequence of our cyber lives. Phishing emails are notorious for having malicious attachments and opening them is a sure way to compromise your device and its data. These attachments are full of malware, ready and waiting to infect your system with a simple click. Make no mistake, any attachment in a questionable email can be dangerous. However, researchers at F-Secure found that some of this year’s biggest email spam campaigns used particular types of malicious attachments more than others. READ FULL STORY

Fake Browser Updates Source Of Ransomware And Banking Malware

Scams & Phishing

Fake Browser Updates Source Of Ransomware And Banking Malware

An all-out alarm reported by Surcuri finds bogus alerts circulating about the need to download the latest browser update. Although it’s always recommended to keep software up to date, this report finds hackers are exploiting that call to action in a big way. Using fake updates isn’t exactly a new hacking exploit, but hackers are getting better at it over time and this latest attack is a solid example of that. In this latest discovery, hackers use email links or script code to compromise a webpage. READ FULL STORY








Close
Fraud News & Alerts!

Keep up with the latest cyber security news through our weekly Fraud News & Alerts updates. Each week you will receive an email containing the latest cyber security news, tips and breach notifications.



You're all set!

You will receive your first official security update email within the next week.

A welcome email has also just been sent to you. If you do not receive this email within the next few minutes, please check your Junk box or spam filter to confirm our emails are not being blocked.


 
Help  
Enter any word or words you like.        

The email newsletter will arrive from news@stickleyonsecurity.com


Loading
Please wait...