Hive ransomware: modern, efficient business model

Hive ransomware: modern, efficient business model

On the so-called dark web, providers of ransomware services and support pitch their products openly
On the so-called dark web, providers of ransomware services and support pitch their products openly. Photo: NICOLAS ASFOURI / AFP/File
Source: AFP

PAY ATTENTION: Celebrate South African innovators, leaders and trailblazers with us! Click to check out Women of Wonder 2022 by Briefly News!

The US Justice Department's shutdown Thursday of the Hive ransomware operation -- which extorted some $100 million from more than 1,5000 victims worldwide -- highlights how hacking has become an ultra-efficient, specialized industry that can allow anyone to become a cyber-shakedown artist.

Modern business model

Hive operated in what cybersecurity experts call a "ransomware as a service" style, or RaaS -- a business that leases it software and methods to others to use in extorting a target.

The model is central to the larger ransomware ecosystem, in which actors specialize in one skill or function to maximize efficiency.

According to Ariel Ropek, director of cyber threat intelligence at cybersecurity firm Avertium, this structure makes it possible for criminals with minimal computer fluency to get into the ransomware game by paying others for their expertise.

Read also

Ticketmaster blames cyberattack for Taylor Swift tour debacle

"There are quite a few of them," Ropek said of RaaS operations.

PAY ATTENTION: Follow Briefly News on Twitter and never miss the hottest topics! Find us at @brieflyza!

"It is really a business model nowadays," he said.

How it works

On the so-called dark web, providers of ransomware services and support pitch their products openly.

At one end are the initial access brokers, who specialize in breaking into corporate or institutional computer systems.

They then sell that access to the hacker, or ransomware operator.

The US Justice Department announced January 26, 2023 it had shut down the Hive ransomware operation, which had extorted more than $100 million from more than 1,500 victims worldwide
The US Justice Department announced January 26, 2023 it had shut down the Hive ransomware operation, which had extorted more than $100 million from more than 1,500 victims worldwide. Photo: Mandel NGAN / AFP
Source: AFP

But the operator depends on RaaS developers like Hive, which have the programming skills to create the malware needed to carry out the operation and avoid counter-security measures.

Typically, their programs -- once inserted by the ransomware operator into the target's IT systems -- are manipulated to freeze, via encryption, the target's files and data.

The programs also extract the data back to the ransomware operator.

Read also

French bakers protest over surging power prices

RaaS developers like Hive offer a full service to the operators, for a large share of the ransom paid out, said Ropek.

"Their goal is to make the ransomware operation as turnkey as possible," he said.

Polite but firm

When the ransomware is planted and activated, the target receives a message telling them how to correspond and how much to pay to get their data unencrypted.

That ransom can run from thousands to millions of dollars, usually depending on the financial strength of the target.

Inevitably the target tries to negotiate on the portal. They often don't get very far.

Menlo Security, a cybersecurity firm, last year published the conversation between a target and Hive's "Sales Department" that took place on Hive's special portal for victims.

In it, the Hive operator courteously and professionally offered to prove the decryption would work with a test file.

But when the target repeatedly offered a fraction of the $200,000 demanded, Hive was firm, insisting the target could afford the total amount.

Read also

Microsoft invests billions in ChatGPT firm OpenAI

Eventually, the Hive agent gave in and offered a significant reduction -- but drew the line there.

"The price is $50,000. It's final. What else to say?" the Hive agent wrote.

FBI Director Christopher Wray with Deputy Attorney General Lisa Monaco (2L), and US Attorney General Merrick Garland (R), announce an international ransomware enforcement action against Hive on January 26, 2023
FBI Director Christopher Wray with Deputy Attorney General Lisa Monaco (2L), and US Attorney General Merrick Garland (R), announce an international ransomware enforcement action against Hive on January 26, 2023. Photo: Mandel NGAN / AFP
Source: AFP

If a target organization refuses to pay, the RaaS developers hold a backup position: they threaten to release the hacked confidential files online or sell them.

Hive maintained a separate website, HiveLeaks, to publish the data.

On the back end of the deal, according to Ropek, there are specialist operations to collect the money, making sure those taking part get their shares of the ransom.

Others, known as cryptocurrency tumblers, help launder the ransom for the hacker to use above-ground.

Modest blow

Thursday's action against Hive was only a modest blow against the RaaS industry.

There are numerous other ransomware specialists similar to Hive still operating.

The biggest current threat is LockBit, which attacked Britain's Royal Mail in early January and a Canadian children's hospital in December.

Read also

'Pokemon Go' creator returns to 'real world' recipe for NBA game

In November, the Justice Department said LockBit had reaped tens of millions of dollars in ransoms from 1,000 victims.

And it isn't hard for Hive's operators to just start again.

"It's a relatively simple process of setting up new servers, generating new encryption keys. Usually there's some kind of rebrand," said Ropek.

PAY ATTENTION: Сheck out news that is picked exactly for YOU ➡️ click on “Recommended for you” and enjoy!

Source: AFP

Authors:
AFP avatar

AFP AFP text, photo, graphic, audio or video material shall not be published, broadcast, rewritten for broadcast or publication or redistributed directly or indirectly in any medium. AFP news material may not be stored in whole or in part in a computer or otherwise except for personal and non-commercial use. AFP will not be held liable for any delays, inaccuracies, errors or omissions in any AFP news material or in transmission or delivery of all or any part thereof or for any damages whatsoever. As a newswire service, AFP does not obtain releases from subjects, individuals, groups or entities contained in its photographs, videos, graphics or quoted in its texts. Further, no clearance is obtained from the owners of any trademarks or copyrighted materials whose marks and materials are included in AFP material. Therefore you will be solely responsible for obtaining any and all necessary releases from whatever individuals and/or entities necessary for any uses of AFP material.