Hunters International Ends Ransomware Era

Hunters International Ends Era on July

Hunters International, a notorious ransomware group, ends its era this month, July 2025. It shuts down and offers free decryptors to victims. For example, it targets companies with data recovery tools. This shift impacts global cybersecurity.

How the Shutdown Happened

The group announced closure on its dark web site. It cited recent law enforcement pressure and low profits. Additionally, it removed all extortion portal entries. Consequently, victims can now seek recovery help.

Malware Capabilities

TA829 deploys SlipScreen to load shellcode. It checks for 55 recent documents before acting. For instance, TransferLoader drops Morpheus ransomware. As a result, it steals data and installs backdoors.

Decryptor Offer and Impact

Hunters International provides free decryption software for affected firms. It aims to ease the burden of ransom payments. For instance, it supports companies hit by past attacks. As a result, data recovery becomes possible without cost.

Evolution and Rebranding

The group started in late 2023, possibly as a Hive rebrand. It targeted Windows, Linux, and ESXi systems. A report notes it shifted to World Leaks for extortion-only attacks. Therefore, its tactics evolved over time.

Targeting and Scale

Hunters International hit over 300 organizations worldwide. Victims include the U.S. Marshals and health networks. Moreover, it demanded millions from big firms. This exposed diverse sectors to significant risks.

Broader Ransomware Trends

Similar groups face law enforcement crackdowns. They often rebrand to evade detection. For example, World Leaks uses upgraded exfiltration tools. As a result, ransomware threats remain dynamic.

Challenges for Victims

The sudden shutdown complicates recovery efforts. Victims must verify decryptor legitimacy. Additionally, past data leaks linger. This demands careful handling of offered tools.

Preventing Ransomware Risks

To avoid future ransomware, back up data regularly. For example, use offline storage for safety. Install updated antivirus and patch systems. Additionally, train employees on phishing signs. These steps help shield against attacks.

Sleep well, we got you covered.

Scroll to Top