• Services
    • Assess
      • Compromise Assessment
      • APT Assessment
      • Penetration Testing
      • Secure Architecture Design & Review
      • Red Team Assessment
      • Purple Team Assessment
      • Social Engineering
      • Source Code Review
    • Transform
      • SOC Consultancy
      •     SOC Maturity Assessment
      •     SOC Model Evaluation
      •     SOC Gap Analysis
      •     SIEM Gap Analysis
      •     SIEM Optimization
      •     SOC Content Pack
    • Train
      • Security Awareness and Training
      • Tabletop Exercise
      • Simulated Cyber Attack Exercises
    • Respond
      • Incident Response
      • Incident Analysis
  • Managed Security
    • Managed Security Monitoring
      • Remote SOC
      • Onsite SOC
      • Hybrid SOC
    • Managed Security Services
      • Managed Detection and Response
      • Managed Endpoint Detection and Response
      • Managed Threat Intelligence
      • Managed Threat Hunting
      • Managed Risk-Based SOAR
      • Managed Penetration Testing
  • Solutions
  • Resources
    • Blog
    • Press Release
    • Threat Advisory
  • Company
    • About Us
    • Careers
    • Contact
Rewterz Threat Update – Anonymous Collective’s Activity Round-Up – Russian-Ukrainian Cyber Warfare
March 29, 2022
Rewterz Threat Alert – APT C36 Blind Eagle – Active IOCs
March 29, 2022

Rewterz Threat Alert – Hive or BlackCat/ALPHV – Active IOCs

March 29, 2022

Severity

Medium

Analysis Summary

Hive ransomware was first observed in the June of 2021. The ransomware group majorly targeted the Healthcare sector and uses several platforms like EXSi, Linux, hypervisors, and Windows. Hive used Goland for their ransomware. The ransomware possesses the capability to move laterally within the victim organization and escalate privileges to encrypt and steal data. The group uses phishing emails to lure the victims.

Researcher rivitna recently found that Hive’s new feature set now resembles that of BlackCat/ALPHV. In case of a ransomware attack, the victim is urged by the threat actor to communicate via a given link. This link contains information on the ongoing negotiations. However, if a malware sample is uploaded on a malware analysis service, security researchers can find these links and tap the communications. The BlackCat group prevented this from happening by removing Tor negotiations URLs from their encryptors. Hive has followed suit and now “requires the attacker to supply the username and login password as a command-line argument when launching the malware.”

Another way in which Hive has copied BlackCat is by shifting from Golang to the Rust programming language.

Impact

  • Unauthorized Access
  • Data Exfiltration
  • File Encryption
  • Financial Loss

Indicators of Compromise

MD5

  • eda8d43b2912eba1eb9379b66aa782cc

SHA-256

  • 2e52494e776be6433c89d5853f02b536f7da56e94bbe86ae4cc782f85bed2c4b

SHA-1

  • f1a8eedd429446b93574105e205bd12d980a0040

Remediation

  • Block all threat indicators at your respective controls.
  • Search for IOCs in your environment.
  • Don’t open emails and messages from unknown or suspicious sources.
  • Services
    • Assess
      • Compromise Assessment
      • APT Assessment
      • Penetration Testing
      • Secure Architecture Design & Review
      • Red Team Assessment
      • Purple Team Assessment
      • Social Engineering
      • Source Code Review
    • Respond
      • Incident Response
      • Incident Analysis
  • Transform
    • SOC Consultancy
    •     SOC Maturity Assessment
    •     SOC Model Evaluation
    •     SOC Gap Analysis
    •     SIEM Gap Analysis
    •     SIEM Optimization
    •     SOC Content Pack
  • Train
    • Security Awareness and Training
    • Tabletop Exercise
    • Simulated Cyber Attack Exercises
  • Managed Security
    • Managed Security Monitoring
      • Remote SOC
      • Onsite SOC
      • Hybrid SOC
    • Managed Security Services
      • Managed Detection and Response
      • Managed Endpoint Detection and Response
      • Managed Threat Intelligence
      • Managed Threat Hunting
      • Managed Risk-Based SOAR
      • Managed Penetration Testing
  • Solutions
  • Resources
    • Blog
    • Threat Advisory
  • Company
    • About Us
    • Careers
    • Contact
COPYRIGHT © REWTERZ. ALL RIGHTS RESERVED.