threatintel
actor tracker
All actors

Hive

hive · primary source: Other · first observed 2021 · last observed 2023
?? · UnknownRansomwareModerate confidencelast cited Jan 25, 2023 · 3y ago

Russian-speaking ransomware-as-a-service operation active from mid-2021 through January 2023. Best known publicly for the May 2022 compromise of the Costa Rican government — which prompted Costa Rica's president to declare a national emergency — and for sustained healthcare-sector targeting. The FBI infiltrated Hive's infrastructure in July 2022, covertly captured decryption keys for victims for seven months (preventing approximately $130M in ransom payments), and on 26 January 2023 seized Hive's leak site and command infrastructure in coordination with German and Dutch police.

Aliases

None tracked.

Motivations

financial gain

Target sectors

healthcaregovernmentmanufacturingeducation

Target countries

USCRGBDEESFR

Diamond Model

Caltagirone / Pendergast / Betz 2013 — four-vertex attribution framework.

Adversary
  • Hive
  • Unknown
  • financial gain
Infrastructure
  • asq.r77vh0.pw
Victim
  • healthcare
  • government
  • manufacturing
  • US
  • CR
  • +1 more

MITRE ATT&CK techniques

Timeline

2 events

Indicators of compromise

3 indicators
csv
TypeValueFirst seenSource
Name
Windows_x64_encrypt.exe
family · Hive
Hive ransomware Windows 64-bit encryptor binary listed as a known IOC in Table 2 of AA22-321A. Hive shipped matching Linux, ESXi and FreeBSD variants and victimized over 1,300 organizations for ~$100M in payments before the FBI infiltrated its network in July 2022.
Nov 16, 2022CISA
Domain
asq[.]r77vh0[.]pw
family · Hive
Hive affiliate staging server hosting a malicious HTA file used during intrusions, listed in Table 2 of AA22-321A. The .pw infrastructure cluster was seized alongside the Hive back-end on Jan. 26, 2023 in the DOJ/FBI takedown announcement.
Nov 16, 2022CISA
Name
HOW_TO_DECRYPT.txt
family · Hive
Hive ransom note dropped into every encrypted directory; instructs victims not to modify the *.key file in C:\ or /root and links to the HiveLeaks Tor chat panel. Listed in Table 2 of joint FBI/CISA/HHS advisory AA22-321A (Nov. 17, 2022).
Nov 16, 2022CISA

Related actors

shared ATT&CK techniques

References

cite this page

Threat Intel Tracker. (2026-05-19). Hive — actor profile. Retrieved from https://threatintel.local/actors/hive

latest cited activity · 2023-01-26 · 3 cataloged indicators