In this month’s Threat Debrief: A rebrand of a rebrand as the Hunters International ransomware group recharts its course. We provide context detailing the group’s origins and factors motivating their actions in light of the recent development. Plus, we discuss a partnership between a Top 10 ransomware group and a secondary, supporting player in the ransomware landscape, and we're covering a new LockBit variant.
Ransomware is a moving target, constantly changing its tactics, and this monthly Bitdefender Threat Debrief helps you stay ahead of the curve. We combine our threat intelligence and insights on adversary behavior with supplementary data from openly available sources (OSINT) – from news reports and other research sources – with data we gather by analyzing Data Leak Sites (DLSs), websites where ransomware groups post details about their victims. It’s important to remember that we can't independently verify all of these claims but are confident in the trends we see over time.
For this month's report, we analyzed data from March 1 to March 31 and recorded a total of 676 victims claimed.
Hunters International is a RaaS (Ransomware as a Service) group that emerged in October of 2023. They originally started as a group that only performed data exfiltration. Hunters International added ransomware to their operations later.
Our findings indicated that Hunters International acquired tools from the Hive ransomware group and activities linked to Hunters International began nearly nine months after law enforcement seized Hive’s infrastructure in early 2023. Hive stopped their operations and Hunters International purchased their code and remaining infrastructure. Hunters International would modify Hive’s source code, notably improving the encryption process and simplifying the parameters and exclusions defined in command line arguments.
Recently, a research firm uncovered a divide within the group and a rebranding of Hunters International. The ransomware operator announced its closure in November of 2024 due to what they called risky and unpromising ransomware operations. Hunters International made multiple references to law enforcement operations designed to disrupt ransomware activities, including those executed in Moscow, that would supposedly reduce their odds of survival. And, the World Leaks group emerged shortly thereafter. They are most likely a rebrand of Hunters International and not a group that is operating independently of Hunters International or without their influence.
Hunters International remains active in March of 2025. We suspect that they will prioritize data exfiltration over the use of encryption. Over the past year, they claimed as many as 41 victim organizations, peaking during the month of April 2024. In the months that followed November 2024 (the so-called end of the group’s operations), Hunters International continued claiming a small number of victims. They claimed 9 victims during the months of December, January, and February. And this past March, Hunters International claimed 6 victims.
Lapses in ransomware activity may be attributed to planning amongst operators, restaffing, or matters like developing proof of concepts. Rebranding is another possibility, as groups typically try to accomplish the following:
For a comprehensive understanding of the current ransomware playbook, including how these attacks are executed and how to defend against them, please read our Ransomware whitepaper.
Now, let’s explore other notable ransomware news and findings since our last Threat Debrief release.
Bitdefender's Threat Debrief analyzes data from ransomware leak sites, where groups publicize their claimed number of compromised organizations. This approach provides valuable insights into the overall activity of the RaaS market. However, there is a trade-off: while it reflects attackers' self-proclaimed success, the information comes directly from criminals and may be unreliable. Additionally, this method only captures the number of victims claimed, not the actual financial impact of these attacks.
Ransomware gangs prioritize targets where they can potentially squeeze the most money out of their victims. This often means focusing on developed countries. Now, let’s see the top 10 countries that took the biggest hit from these attacks.
The Bitdefender Threat Debrief (BDTD) is a monthly series analyzing threat news, trends, and research from the previous month. Don’t miss the next BDTD release, subscribe to the Business Insights blog, and follow us on Twitter. You can find all previous debriefs here.
Bitdefender provides cybersecurity solutions and advanced threat protection to hundreds of millions of endpoints worldwide. More than 180 technology brands have licensed and added Bitdefender technology to their product or service offerings. This vast OEM ecosystem complements telemetry data already collected from our business and consumer solutions. To give you some idea of the scale, Bitdefender Labs discover 400+ new threats each minute and validate 30 billion threat queries daily. This gives us one of the industry’s most extensive real-time views of the evolving threat landscape.
We would like to thank Bitdefenders Vlad Craciun, Mihai Leonte, Gabriel Macovei, Andrei Mogage, and Rares Radu for their help putting this report together.
tags
Jade Brown is a threat researcher at Bitdefender. A cybersecurity thought leader who is passionate about contributing to operations that involve cybersecurity strategy and threat research, she also has extensive experience in intelligence analysis and investigation.
View all postsDon’t miss out on exclusive content and exciting announcements!