<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hive0137 and AI-supplemented malware distribution in Threats</title>
    <link>https://community.isc2.org/t5/Threats/Hive0137-and-AI-supplemented-malware-distribution/m-p/72515#M1277</link>
    <description>&lt;P&gt;Hi All&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;IBM X-Force tracks dozens of threat actor groups. One group in particular, tracked by X-Force as Hive0137, has been a highly active malware distributor since at least October 2023. &lt;A href="https://securityintelligence.com/x-force/spam-trends-campaigns-senior-superlatives-2023/" target="_blank" rel="noopener nofollow"&gt;Nominated by X-Force as having the “Most Complex Infection Chain&lt;/A&gt;” in a campaign in 2023, Hive0137 campaigns deliver DarkGate, NetSupport, T34-Loader and Pikabot malware payloads, some of which are likely used for initial access in ransomware attacks. The crypters used in the infection chains also suggest a close relationship with former members of ITG23 (Conti/Trickbot group). Following law enforcement efforts known as Operation Endgame, Hive0137 was found delivering a new backdoor known as WarmCookie.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://securityintelligence.com/x-force/hive0137-on-ai-journey/" target="_blank"&gt;https://securityintelligence.com/x-force/hive0137-on-ai-journey/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_Cautim&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Sun, 28 Jul 2024 05:37:23 GMT</pubDate>
    <dc:creator>Caute_cautim</dc:creator>
    <dc:date>2024-07-28T05:37:23Z</dc:date>
    <item>
      <title>Hive0137 and AI-supplemented malware distribution</title>
      <link>https://community.isc2.org/t5/Threats/Hive0137-and-AI-supplemented-malware-distribution/m-p/72515#M1277</link>
      <description>&lt;P&gt;Hi All&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;IBM X-Force tracks dozens of threat actor groups. One group in particular, tracked by X-Force as Hive0137, has been a highly active malware distributor since at least October 2023. &lt;A href="https://securityintelligence.com/x-force/spam-trends-campaigns-senior-superlatives-2023/" target="_blank" rel="noopener nofollow"&gt;Nominated by X-Force as having the “Most Complex Infection Chain&lt;/A&gt;” in a campaign in 2023, Hive0137 campaigns deliver DarkGate, NetSupport, T34-Loader and Pikabot malware payloads, some of which are likely used for initial access in ransomware attacks. The crypters used in the infection chains also suggest a close relationship with former members of ITG23 (Conti/Trickbot group). Following law enforcement efforts known as Operation Endgame, Hive0137 was found delivering a new backdoor known as WarmCookie.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://securityintelligence.com/x-force/hive0137-on-ai-journey/" target="_blank"&gt;https://securityintelligence.com/x-force/hive0137-on-ai-journey/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_Cautim&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 28 Jul 2024 05:37:23 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Threats/Hive0137-and-AI-supplemented-malware-distribution/m-p/72515#M1277</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2024-07-28T05:37:23Z</dc:date>
    </item>
    <item>
      <title>Re: Hive0137 and AI-supplemented malware distribution</title>
      <link>https://community.isc2.org/t5/Threats/Hive0137-and-AI-supplemented-malware-distribution/m-p/72651#M1298</link>
      <description>&lt;P&gt;Thanks for sharing&amp;nbsp;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/809125741"&gt;@Caute_cautim&lt;/a&gt;.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 31 Jul 2024 06:24:59 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Threats/Hive0137-and-AI-supplemented-malware-distribution/m-p/72651#M1298</guid>
      <dc:creator>Kyaw_Myo_Oo</dc:creator>
      <dc:date>2024-07-31T06:24:59Z</dc:date>
    </item>
    <item>
      <title>Re: Hive0137 and AI-supplemented malware distribution</title>
      <link>https://community.isc2.org/t5/Threats/Hive0137-and-AI-supplemented-malware-distribution/m-p/72742#M1314</link>
      <description>&lt;P&gt;Hive0137 is a significant threat actor group tracked by IBM X-Force, known for its complex infection chains and active malware distribution since at least October 2023. They have been involved in campaigns delivering malware like DarkGate, NetSupport, T34-Loader, and Pikabot, which are often used for initial access in ransomware attacks. Their use of crypters indicates a possible connection with former ITG23 members. Despite law enforcement's Operation Endgame, Hive0137 has adapted, now deploying a new backdoor called WarmCookie.&lt;/P&gt;</description>
      <pubDate>Fri, 02 Aug 2024 17:49:06 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Threats/Hive0137-and-AI-supplemented-malware-distribution/m-p/72742#M1314</guid>
      <dc:creator>leefarrellhelps</dc:creator>
      <dc:date>2024-08-02T17:49:06Z</dc:date>
    </item>
  </channel>
</rss>

