Threat Groups

Hunters Ransomware Group

1. Overview

Hunters International, often referred to simply as Hunters, is a financially motivated ransomware group that emerged in late 2023. Operating a structured Ransomware-as-a-Service (RaaS) model, Hunters offers its platform to affiliates while managing infrastructure, data leak portals, and ransom negotiations.

Hunters is believed to be the successor to the Hive ransomware operation, which was dismantled by law enforcement in early 2023. Malware analysis reveals shared codebases, encryption methods, and operational workflows that strongly suggest continuity. The group employs double extortion tactics, exfiltrating sensitive data before encrypting networks, and threatening public disclosure to pressure victims into paying.


2. Origin and Evolution

Following the takedown of Hive by an international coalition led by the FBI, remnants of the group re-emerged under the banner of Hunters International. The new group adopted updated infrastructure, rebranded their malware, and launched a new leak site on the dark web. Forensic links to Hive include similarities in ransomware locker design, TOR negotiation portals, and encryption routines.

Hunters has been observed refining its approach, adopting more tailored targeting and expanding capabilities to impact both Windows and Linux, including VMware ESXi environments.


3. Tactics, Techniques, and Procedures (TTPs)

Hunters follows a playbook common to many modern ransomware groups, but with a focus on stealth, persistence, and careful targeting. Key techniques include:

  • Initial Access:
    Exploitation of known vulnerabilities in public-facing applications (T1190), credential brute force (T1110.001), and phishing emails (T1566.001).
  • Lateral Movement:
    Use of tools such as Cobalt Strike, Mimikatz, and RDP for network traversal and privilege escalation (T1021, T1055).
  • Data Exfiltration:
    Hunters affiliates use WinSCP, Rclone, and custom scripts to exfiltrate large volumes of data before encryption (T1041).
  • Encryption:
    Strong AES + RSA encryption is deployed using custom payloads, with the ransomware configured to avoid encrypting critical system files to preserve operability.
  • Persistence & Evasion:
    Living-off-the-land binaries (LOLBins), anti-forensic routines, and process termination tactics help avoid detection and hinder recovery efforts.

4. Targeting Profile

Hunters International adopts a sector-agnostic approach, targeting organisations based on opportunity, value of stolen data, and likelihood of ransom payment. High-profile targeting to date has included:

  • Healthcare and medical institutions
  • Legal services and law firms
  • Public sector organisations and local councils
  • Educational institutions and universities
  • Financial Services and Banking

UK-based firms, especially those holding regulated or sensitive data, are at heightened risk. Organisations with poor segmentation, weak remote access controls, or outdated infrastructure are often prime candidates.


5. Notable Campaigns and Victims

While Hunters does not have the same media presence as LockBit or Cl0p, their dark web leak site features victims across Europe, North America, and Asia. Known breaches include:

  • A healthcare provider in Central Europe with over 2TB of patient data exfiltrated
  • A UK-based law firm handling class action lawsuits
  • A North American educational body with student and faculty records leaked

Victim data is typically published in stages, escalating pressure on non-compliant organisations.


6. Ransomware and Leak Site Behaviour

Hunters operates a professionalised leak portal on the dark web, showcasing compromised data in a tiered release format. The group’s double extortion model follows this pattern:

  1. Data is stolen prior to encryption
  2. Systems are encrypted, and a ransom note is left with TOR contact links
  3. Victims engage via a secure portal with countdowns and live chat functionality
  4. Data is leaked incrementally if negotiations fail

The tone of negotiation is typically professional, though the group has used aggressive messaging in cases involving regulatory data.


7. Technical Indicators

Although Hunters’ payloads evolve rapidly, common indicators include:

  • File extensions ending in .hunters or .HUNTERS
  • Presence of rclone.exe, winscp.exe, and 7zip.exe in unusual directories
  • Registry modifications disabling recovery features and security tools
  • Outbound traffic to command-and-control infrastructure hosted in Russia, Germany, or Panama

YARA rules and full IOC packs are available to UK Cyber Defence Ltd clients upon request.


8. Defensive Measures and Recommendations

To mitigate the risk of Hunters ransomware, UK organisations are advised to:

  • Deploy MFA on all external-facing services
  • Monitor and restrict RDP and SMB access
  • Ensure EDR/XDR tools are active and configured to detect living-off-the-land behaviours
  • Back up critical data offline and test restoration procedures regularly
  • Apply patches for known exploited vulnerabilities, particularly VPN appliances, Exchange servers, and web platforms
  • Train staff to detect spear-phishing and impersonation tactics

9. Attribution and Alliances

While direct attribution remains unconfirmed, significant overlaps with Hive suggest Hunters International was either created by or includes former Hive operators. No nation-state affiliation has been observed. The group appears to be motivated solely by profit and has adopted a tight operational security posture to avoid law enforcement disruption.


10. Conclusion

Hunters International represents a technically capable and strategically quiet ransomware threat. Its post-Hive structure, double extortion tactics, and focus on sectors with sensitive data make it a high-priority concern for UK organisations. Proactive detection, segmentation, and resilience planning are critical to withstanding a potential Hunters attack.


Author:
Threat Intelligence Team, UK Cyber Defence Ltd
All intelligence current as of May 2025


				

you may also like

Stay Informed. Stay Secure.

Subscribe to our newsletter.