Hunters International is a relatively new, yet highly impactful, Ransomware-as-a-Service (RaaS) group that emerged in late 2023. This group quickly gained notoriety for its aggressive data exfiltration and extortion tactics, targeting a wide array of industries globally. Unlike some ransomware groups that focus solely on encryption, Hunters International prioritizes stealing sensitive data before encrypting systems, significantly increasing the pressure on victims to pay ransoms. This "double extortion" method, combined with the group's possible connections to the dismantled Hive ransomware operation, makes Hunters International a significant threat to organizations worldwide. The group's use of advanced techniques, including exploiting known vulnerabilities and deploying custom tools, demonstrates a level of sophistication that warrants a deep understanding of their operations.
Hunters International surfaced in October 2023, shortly after the international law enforcement operation that disrupted the notorious Hive ransomware group. While Hunters International has publicly denied being a direct rebrand of Hive, they have admitted to acquiring portions of Hive's source code and infrastructure. Security researchers have identified significant code overlap (approximately 60%) between Hunters International and Hive, specifically in the encryption logic. This suggests a strong connection, potentially involving former Hive affiliates or developers who repurposed the code.
The evolution of Hunters International has been rapid. Initially written in C and Go, later versions were rewritten in Rust. This shift to Rust offers several advantages, including enhanced security, improved performance, and potentially better evasion capabilities against traditional security solutions. Furthermore, Hunters International has streamlined its ransomware, reducing command-line options and optimizing key management compared to Hive, making it both more efficient for attackers and, paradoxically, easier for victims who pay to decrypt their data, as the decryption keys are embedded in the encrypted files. This rapid development and refinement of their tools underscore the group's commitment to continuous improvement and its adaptability to the evolving threat landscape.
Hunters International, operating as a RaaS, employs a range of sophisticated tactics, techniques, and procedures (TTPs) to compromise its victims. The group's affiliates likely leverage various initial access vectors, but several key methods have been observed:
Exploitation of Public-Facing Applications: A primary entry point involves exploiting vulnerabilities in publicly accessible applications, particularly Oracle WebLogic Server. Attackers have been observed connecting to the debug port (TCP 8453) and leveraging CVE-2020-14644 to achieve remote code execution. This allows them to install web shells, such as China Chopper, for persistent access. They also actively exploited 10 other CVEs related to WebLogic.
Exploitation of Known CVEs: Actively Exploited 10 CVEs associated with WebLogic.
Web Shell Deployment: The China Chopper web shell is frequently used to maintain persistence and execute commands on compromised systems.
Deployment of AutoIt Malware: Attackers have deployed AutoIt malware which is used to scan the network and establish lateral movement. The malware's configuration can involve the execution of scripts to compromise the Domain Controller by using Zerologon (CVE-2020-1472) and SECRETSDUMP DCSYNC.
Reconnaissance and Lateral Movement: Hunters International employs a combination of built-in Windows tools (LOLBins) and custom tools for reconnaissance and lateral movement. This includes:
* Network Enumeration: Using commands like ipconfig /all
and nltest /domain_trusts
.
* User and Credential Enumeration: Querying Active Directory for user information (SIDs, usernames, last login) and saving the results.
* Credential Dumping: Extracting hashed passwords from the SAM and SYSTEM registry hives. Understanding Windows Registry structure helps to get valuable infomration during credential dumping. https://thesecmaster.com/windows-registry-structure-understanding-keys-values-and-hives-in-windows-registry
* Active Directory Attacks: Leveraging techniques like DCSync and DFSCoerce to extract the NTDS.DIT database.
* Account Manipulation: Adding new accounts to the Administrator or Remote Desktop Users groups.
* Linux Reconnaissance: Enumerating Linux user accounts and checking for privileged group memberships (wheel, adm). Understanding basics of linux is very helpful during the enumeration process. https://thesecmaster.com/basics-of-linux-operating-systemgetting-to-know-the-basics-is-key-to-mastering-linux-programming
* Remote Access Tools: Utilizing tools like AnyDesk, Plink, TeamViewer, RDP, and Impacket for remote access and control.
Data Collection, Exfiltration, and Encryption:
* Database Extraction: Using SQL Server's xp_cmdshell
to export MySQL databases with mysqldump
.
* Data Exfiltration: Uploading stolen data to the MEGA cloud storage service. This is a key differentiator from some ransomware groups, emphasizing data theft as a primary objective.
* Ransomware Execution: Distributing a file named delete.me (purpose currently unknown) and executing the ransomware binary (encrypter_windows_x64.exe
). The encrypter requires valid command-line arguments (-c username:password
), with credentials included in the ransom notes. The GUI nature of the encrypter suggests a focus on user-friendliness for affiliates.
* Disabling Backup and Recovery: Using commands like vssadmin.exe delete shadows /all /quiet
and wmic.exe shadowcopy delete
to remove Volume Shadow Copies, hindering data recovery. They also disable Data Execution Prevention (DEP) using bcdedit.exe /set {current} nx alwaysoff
.
Custom Tools: Use of custom tools like SharpRhino Remote Access Trojan which maintains persistence through modification of registries and placing itself in multiple directories to ensure redundancy.
Encryption Process: The ransomware employs AES encryption with RSA to secure the encryption keys. It targets network drives and appends the .LOCKED
extension to encrypted files. Ransom notes named read me now!.txt
are dropped in affected directories. The encryption key is embedded within the encrypted files, simplifying decryption for victims who pay.
Hunters International exhibits opportunistic targeting, impacting a wide range of industries and geographic locations. There is no specific industry focus, but the group has demonstrated a global reach, with victims in the United States, United Kingdom, Germany, Japan, Brazil, and numerous other countries. Notably, there have been no known attacks linked to Russia, which is a common exclusion for some cybercriminal groups.
Targeted Industries:
Healthcare
Automotive
Manufacturing
Logistics
Finance
Education
Food industry
Construction
Geographic Scope:
United States
United Kingdom
Germany
Japan
Brazil
And many others globally (at least 29 countries confirmed, with likely many more unreported)
The group's focus on data exfiltration suggests a motivation driven by financial gain, leveraging the stolen data for extortion. The broad range of industries indicates an opportunistic approach, likely relying on affiliates to exploit vulnerabilities wherever they are found. The potential impact of a successful attack includes data breaches, operational disruption, financial losses, and reputational damage.
Several notable attack campaigns have been attributed to Hunters International:
ICBC London Branch (September 2024): Hunters International claimed responsibility for stealing 6.6 TB of data (5.2 million files) from the London branch of the Industrial and Commercial Bank of China (ICBC).
Anderson Oil & Gas (August 2024): A data breach impacting this company resulted in significant financial and reputational harm.
Barber Specialties (January 2025): This construction company was targeted, highlighting the group's willingness to attack businesses across various sectors.
US Marshals and FBI: Leaked data from the US Marshals and the FBI. Staying informed through threat intelligence is crucial to understand such attacks. https://thesecmaster.com/what-is-threat-intelligence-and-why-it-is-important
These incidents demonstrate the group's capability to compromise organizations of varying sizes and industries, underscoring the widespread threat they pose. The double extortion tactic, combined with the potential for significant data leaks, makes Hunters International a particularly dangerous adversary.
Protecting against Hunters International requires a multi-layered defense strategy, focusing on both prevention and detection:
Patch Management: Regularly update and patch all systems, especially public-facing applications like Oracle WebLogic Server and SQL servers. Address known vulnerabilities promptly. Keep RDP configurations up-to-date. Having a good patch management strategy helps in this case. https://thesecmaster.com/patch-management-strategy-balancing-security-productivity-and-downtime
Endpoint Detection and Response (EDR): Deploy and maintain a robust EDR solution to detect and respond to suspicious activity on endpoints. This should include monitoring for common ransomware behaviors, such as process injection, file encryption, and shadow copy deletion.
User Awareness Training: Educate employees about phishing and social engineering tactics. This is crucial to prevent initial access via malicious emails or links. Training should include recognizing suspicious emails, avoiding clicking on unknown links, and verifying the legitimacy of websites. Also doing phishing simulation helps to create awareness among the employees. https://thesecmaster.com/what-is-phishing-simulation-why-phishing-simulation-is-important-for-an-organization
Network Segmentation: Implement network segmentation to limit lateral movement within the network. This can contain a breach and prevent ransomware from spreading to critical systems.
Backup and Recovery: Maintain regular, offline backups of critical data. Test the restoration process frequently to ensure its effectiveness in the event of an attack. Offline backups are essential to prevent ransomware from encrypting backup data.
Multi-Factor Authentication (MFA): Enforce MFA for all critical systems and accounts, especially for remote access and administrative privileges.
Least Privilege Principle: Restrict user access to only the resources necessary for their job functions. This limits the potential damage from compromised accounts.
Monitoring and Alerting: Implement robust monitoring and alerting systems to detect suspicious activity, such as unusual network traffic, unauthorized access attempts, and large-scale file modifications. Implementing effective security logging is very important in monitoring and alerting. https://thesecmaster.com/security-logging-and-monitoring-the-9-web-application-security-risk
Threat Intelligence: Leverage threat intelligence feeds to stay informed about the latest TTPs used by Hunters International and other ransomware groups.
Disable Unnecessary Services: Disable or restrict access to services that aren't essential. A vulnerability assessment helps to identfy the unnecessary services. https://thesecmaster.com/vulnerability-assessments-strategy-identifying-and-prioritizing-system-risks
Organizations need a robust cyber incident response plan to defend against any cyber attacks. https://thesecmaster.com/what-is-cyber-incident-response-plan-what-should-a-cirp-have
Hunters International represents a significant and evolving threat in the ransomware landscape. Its origins, potentially linked to the dismantled Hive operation, its use of advanced tactics, including data exfiltration and vulnerability exploitation, and its global reach make it a formidable adversary. The group's rapid development and adoption of the Rust programming language highlight its commitment to innovation and evasion. Organizations must adopt a proactive, multi-layered defense strategy, combining robust security controls, user awareness training, and continuous monitoring, to effectively mitigate the risk posed by Hunters International and similar RaaS groups. Staying informed about the group's latest TTPs and leveraging threat intelligence are crucial for maintaining a strong security posture in the face of this persistent threat.
Found this article interesting? Keep visit thesecmaster.com, and our social media page on Facebook, LinkedIn, Twitter, Telegram, Tumblr, Medium, and Instagram and subscribe to receive tips like this.
You may also like these articles:
Arun KL is a cybersecurity professional with 15+ years of experience in IT infrastructure, cloud security, vulnerability management, Penetration Testing, security operations, and incident response. He is adept at designing and implementing robust security solutions to safeguard systems and data. Arun holds multiple industry certifications including CCNA, CCNA Security, RHCE, CEH, and AWS Security.
“Knowledge Arsenal: Empowering Your Security Journey through Continuous Learning”
"Cybersecurity All-in-One For Dummies" offers a comprehensive guide to securing personal and business digital assets from cyber threats, with actionable insights from industry experts.
BurpGPT is a cutting-edge Burp Suite extension that harnesses the power of OpenAI's language models to revolutionize web application security testing. With customizable prompts and advanced AI capabilities, BurpGPT enables security professionals to uncover bespoke vulnerabilities, streamline assessments, and stay ahead of evolving threats.
PentestGPT, developed by Gelei Deng and team, revolutionizes penetration testing by harnessing AI power. Leveraging OpenAI's GPT-4, it automates and streamlines the process, making it efficient and accessible. With advanced features and interactive guidance, PentestGPT empowers testers to identify vulnerabilities effectively, representing a significant leap in cybersecurity.
Tenable BurpGPT is a powerful Burp Suite extension that leverages OpenAI's advanced language models to analyze HTTP traffic and identify potential security risks. By automating vulnerability detection and providing AI-generated insights, BurpGPT dramatically reduces manual testing efforts for security researchers, developers, and pentesters.
Microsoft Security Copilot is a revolutionary AI-powered security solution that empowers cybersecurity professionals to identify and address potential breaches effectively. By harnessing advanced technologies like OpenAI's GPT-4 and Microsoft's extensive threat intelligence, Security Copilot streamlines threat detection and response, enabling defenders to operate at machine speed and scale.