Original Article Text

Click to Toggle View

French police arrests Russian suspect linked to Hive ransomware. French authorities arrested a Russian national in Paris for allegedly helping the Hive ransomware gang with laundering their victims' ransom payments. "New arrest in the Hive ransomware affair: after the international search in January to dismantle this network of hackers constituting a serious threat, the Judicial Police arrested in Paris an individual suspected of having laundered money from these cyber attacks," the French National Police said (automated translation). The suspect was apprehended after the French Anti-Cybercrime Office (OFAC) linked him to digital wallets that received millions of U.S. dollars from suspicious sources based on his activity on social networks. Police agents also seized €570,000 worth of cryptocurrency assets when they detained the 40-year-old suspect and Cyprus resident on December 5, as first reported by LeMagIT. "At the same time, the full cooperation with Europol, Eurojust and the Cypriot authorities made it possible to search his home in a Cypriot seaside resort, thus providing important elements of investigation," said Nicolas Guidoux, a Deputy Director in the French Ministry of the Interior. "On December 9, 2023, he was referred to the specialized prosecutor's office of the Paris judicial court." This comes after Hive ransomware's Tor websites were seized in January in an international law enforcement operation after the FBI infiltrated the gang's servers in late July 2022. ​This provided detailed information about Hive's attacks before they occurred and helped warn their targets. The FBI also obtained and provided victims with over 1,300 decryption keys, preventing roughly $130 million in ransom payments from falling into the cybercriminals' hands. Besides decryption keys, the FBI and Dutch police also discovered Hive communication records, malware file hashes, and details on 250 Hive affiliates stored on Hive servers at a hosting provider in California and backup servers in the Netherlands. The U.S. State Department is now offering up to $10 million for any information that could help link the Hive ransomware group (or other threat actors) with foreign governments. In November, the FBI revealed that this ransomware operation had extorted around $100 million from over 1,500 companies since June 2021. ​Hive operated as a ransomware-as-a-service (RaaS) provider for over two years since June 2019. It used phishing attacks, exploited vulnerabilities in internet-facing devices, and compromised stolen credentials to breach organizations. Since law enforcement took down the gang's infrastructure, a new ransomware-as-a-service (RaaS) operation named Hunters International has surfaced using code used by the Hive ransomware operation. While analyzing a Hunters International ransomware sample, security researcher Will Thomas found code overlaps and similarities that matched over 60% of Hive ransomware's code. This led to the valid assumption that the old ransomware gang has resumed activity under a different brand. Yet, the Hunters International collective refutes the researchers' claims, dismissing them as "allegations," saying they're a new ransomware service that purchased the encryptor source code from Hive's developers. Moreover, the group claims that their primary focus isn't encryption; instead, their operation's primary goal is to steal data and use it to pressure victims into paying ransoms.

Daily Brief Summary

CYBERCRIME // Russian Linked to Ransomware Gang Arrested by French Police

French authorities have arrested a Russian national suspected of laundering money for the Hive ransomware gang.

The arrest was made possible through the efforts of the French Anti-Cybercrime Office (OFAC), which linked the suspect to digital wallets connected to ransom payments.

During the arrest, approximately €570,000 worth of cryptocurrency assets were seized by the police.

The operation was a collaborative effort involving Europol, Eurojust, and Cypriot authorities, including a search of the suspect's residence in Cyprus.

Prior to the arrest, Hive's Tor websites were taken down by an international law enforcement operation that also led to the FBI infiltrating Hive's servers.

The FBI managed to provide over 1,300 decryption keys to victims, preventing significant ransom payments.

The U.S. State Department is offering a reward of up to $10 million for information linking the Hive ransomware group or other cybercriminals to foreign governments.

A new ransomware-as-a-service group, Hunters International, has emerged following Hive's takedown, with significant code overlap suggesting a possible rebirth of the Hive group under a new name, though this is contested by Hunters International.