



Windows Defender) in order to make them stop working. The cybercriminals behind it make the data encryption run smoothly by searching for processes that relate to the copying of information, backups, and security solutions (e.g.As an attack pattern, the theft of the essential documents precedes the encryption routine in order to threaten the affected users with data leakage actions if the ransom is not paid.This way, hackers get initials access and then are able to perform the lateral movement on the network.It can be distributed via compromised files through phishing emails and Remote Desktop Protocol (RDP).Hive Ransomware: How It WorksĪccording to the document published by the FBI, Hive ransomware, which was initially noticed in June 2021, has the below characteristics:
HIVE DEFENDER SOFTWARE
Another victim was also Altus Group, where hackers stole business info and files from the software provider that was later made public on HiveLeaks. Hive ransomware is a data encryption malware that has recently come to the public’s attention through its attacks targeting the Memorial Health System where employees had to use paper charts to go on working as their computers got encrypted. Following the cyberattacks that involved the Hive ransomware, the FBI (Federal Bureau of Investigation) has revealed some technical data and IoC (Indicators of Compromise) related to this topic.
