<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hive0051 goes all in with a triple threat in Threats</title>
    <link>https://community.isc2.org/t5/Threats/Hive0051-goes-all-in-with-a-triple-threat/m-p/69367#M1173</link>
    <description>&lt;P&gt;Hi All&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;HR /&gt;Hi All&lt;DIV class=""&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;P&gt;As of April 2024, IBM X-Force is tracking new waves of Russian state-sponsored Hive0051 (aka UAC-0010, Gamaredon) activity featuring new iterations of Gamma malware first observed in November 2023. These discoveries follow late October 2023&lt;A href="https://securityintelligence.com/x-force/hive0051-malicious-operations-enabled-dns-fluxing/" target="_blank" rel="noopener"&gt; findings,&lt;/A&gt; detailing Hive0051’s use of a novel multi-channel method of rapidly rotating C2 infrastructure (DNS Fluxing) to deliver&amp;nbsp;new Gamma malware variants, facilitating more than a thousand infections in a single day.&lt;/P&gt;&lt;P&gt;An examination of a sample of the lures associated with the ongoing activity reveals a focus on regional military, police and civil government training centers across Ukraine. In addition to collecting against Ukrainian combat capabilities, it is possible Hive0051 may seek to utilize access to gain advanced insight into the status of new security agreements and partners providing military training and material support to Ukraine.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://securityintelligence.com/x-force/hive0051-all-in-triple-threat/" target="_blank"&gt;https://securityintelligence.com/x-force/hive0051-all-in-triple-threat/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_Cautim&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_Cautim&lt;/P&gt;</description>
    <pubDate>Thu, 11 Apr 2024 00:04:14 GMT</pubDate>
    <dc:creator>Caute_cautim</dc:creator>
    <dc:date>2024-04-11T00:04:14Z</dc:date>
    <item>
      <title>Hive0051 goes all in with a triple threat</title>
      <link>https://community.isc2.org/t5/Threats/Hive0051-goes-all-in-with-a-triple-threat/m-p/69367#M1173</link>
      <description>&lt;P&gt;Hi All&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;HR /&gt;Hi All&lt;DIV class=""&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;P&gt;As of April 2024, IBM X-Force is tracking new waves of Russian state-sponsored Hive0051 (aka UAC-0010, Gamaredon) activity featuring new iterations of Gamma malware first observed in November 2023. These discoveries follow late October 2023&lt;A href="https://securityintelligence.com/x-force/hive0051-malicious-operations-enabled-dns-fluxing/" target="_blank" rel="noopener"&gt; findings,&lt;/A&gt; detailing Hive0051’s use of a novel multi-channel method of rapidly rotating C2 infrastructure (DNS Fluxing) to deliver&amp;nbsp;new Gamma malware variants, facilitating more than a thousand infections in a single day.&lt;/P&gt;&lt;P&gt;An examination of a sample of the lures associated with the ongoing activity reveals a focus on regional military, police and civil government training centers across Ukraine. In addition to collecting against Ukrainian combat capabilities, it is possible Hive0051 may seek to utilize access to gain advanced insight into the status of new security agreements and partners providing military training and material support to Ukraine.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://securityintelligence.com/x-force/hive0051-all-in-triple-threat/" target="_blank"&gt;https://securityintelligence.com/x-force/hive0051-all-in-triple-threat/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_Cautim&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_Cautim&lt;/P&gt;</description>
      <pubDate>Thu, 11 Apr 2024 00:04:14 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Threats/Hive0051-goes-all-in-with-a-triple-threat/m-p/69367#M1173</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2024-04-11T00:04:14Z</dc:date>
    </item>
  </channel>
</rss>

