HomeMalware & ThreatsHunters International Ransomware shifts focus to data exfiltration and extortion

Hunters International Ransomware shifts focus to data exfiltration and extortion

Published on

spot_img

In recent times, ransomware gangs have been known for their strategy of stealing data from servers before encrypting it, putting pressure on victims by holding their information hostage until a ransom is paid. This dual-threat approach has been a hallmark of these cybercriminal groups, as they not only encrypt sensitive data but also threaten to sell it to interested parties if their demands are not met.

However, a noticeable shift in tactics has emerged among these gangs as law enforcement agencies and government surveillance efforts have intensified, leading to a decrease in the profitability of traditional ransomware attacks. In response to these challenges, many cybercriminal groups are exploring new methods to achieve their objectives.

One such group, Hunters International, known for their file-encrypting malware operations since 2023, made headlines in November 2024 when they announced their retirement from ransomware activities. Despite this declaration, they have unveiled a new approach that revolves around exfiltrating data and extorting victims without the need to encrypt entire databases.

According to a recent study conducted by Group-IB, Hunters International has launched a dark web platform called “World Leaks” to facilitate their data extortion scheme. This website serves as a repository for leaked breach data and provides a means for the cybercriminal group to extort organizations by demanding a ransom in exchange for not exposing their compromised data.

The unveiling of World Leaks on January 1, 2025, marked the beginning of a new chapter in Hunters International’s approach to cybercrime. Since its inception, the group has targeted over 280 organizations, including well-known names like Tata Technologies, AutoCanada, the US Marshals Service, Hoya, Austal USA, and Integris Health. This shift towards data extortion suggests a strategic focus on industries that heavily rely on sensitive data, such as healthcare, finance, and manufacturing.

As cybercriminals continue to evolve their methods and adapt to changing cybersecurity landscapes, the rise of data extortion schemes poses a significant threat to organizations worldwide. The emergence of groups like Hunters International underscores the need for enhanced cybersecurity measures and proactive defense strategies to mitigate the risks associated with such malicious activities.

In light of these developments, industry experts and cybersecurity professionals emphasize the importance of robust security protocols, employee training, and regular threat assessments to safeguard against the growing menace of data extortion and ransomware attacks. By staying vigilant and proactive in the face of evolving cyber threats, organizations can better protect their valuable data assets and minimize the impact of potential breaches orchestrated by cybercriminal groups.

Source link

Latest articles

Cyble Calls for Immediate Patching of Critical Vulnerabilities Impacting Industrial Systems

In a recent development, it has been reported that multiple industrial control system (ICS)...

Financial Fraud Dominates Cyber Claims with a Third-Party Twist

Recent reports have shed light on the ongoing threat of cyber attacks, with ransomware...

Threat Actors Exploit Email Bombing to Avoid Detection by Security Tools and Hide Malicious Behavior

Email bombing, also known as a "spam bomb," has become a favored tool among...

Ransomware attackers focus on Active Directory Domain Controllers

Microsoft has issued a warning regarding ransomware hackers targeting Active Directory domain controllers to...

More like this

Cyble Calls for Immediate Patching of Critical Vulnerabilities Impacting Industrial Systems

In a recent development, it has been reported that multiple industrial control system (ICS)...

Financial Fraud Dominates Cyber Claims with a Third-Party Twist

Recent reports have shed light on the ongoing threat of cyber attacks, with ransomware...

Threat Actors Exploit Email Bombing to Avoid Detection by Security Tools and Hide Malicious Behavior

Email bombing, also known as a "spam bomb," has become a favored tool among...