Microsoft identifies sophisticated Hive ransomware variant written in Rust
The move away from Go and an encryption redesign makes the new strain even more of a threat to business targets
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
You are now subscribed
Your newsletter sign-up was successful
The threat actors behind Hive ransomware have made major changes to the payload in a new variant exposed by Microsoft Threat Intelligence Center (MSTIC).
Most notable among the updates is the migration of the ransomware’s code to a new language, and the employment of a more sophisticated encryption method.
RELATED RESOURCE
Securing endpoints amid new threats
Ensuring employees have the flexibility and security to work remotely
These changes provide the ransomware with better control over low-level resources, a more user-friendly syntax for threat actors and a structure more conducive to efficient encryption.
The new encryption method means certain countermeasures against Hive have become less effective. Instead of embedding an encrypted key in each file that the payload affects, the new variant employs a novel method of encryption that is far harder to remedy.
MSTIC explains that it “generates two sets of keys in memory, uses them to encrypt files, and then encrypts and writes the sets to the root of the drive it encrypts, both with .key extension.”
MSTIC also warns that the new variant does not contain the ‘help’ menu available for attackers in previous versions, which means that although attackers must now memorise parameters themselves, it also makes the task of discovering parameters harder for security researchers.
Hive ransomware was first discovered in June 2021, and since has been used for numerous attacks such as that suffered recently by the Costa Rican healthcare service. Like other ransomware, once deployed its payload works to disable system processes and services that might contain it or allow the victim to prevent it from encrypting key files.
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
It also deletes backups to prevent the victim from safely recovering their files, and then produces a ransom note in plain text format. MSTIC credits it with large-scale attacks in the software and healthcare sectors.
Another piece of ransomware coded in Rust, called BlackCat, was flagged by the FBI earlier this year as having breached over 60 organisations worldwide.
Ransomware-as-a-service (RaaS) models, in which threat actors lease ransomware software from malicious developers rather than developing and deploying their own software, are increasingly popular and threatening to businesses.
In the Sophos 2022 Threat Report, the security company asserts that going forward, “the RaaS business model will continue to dominate the threat landscape for ransomware attacks, as this model permits experts in ransomware construction to continue to build and improve their product while giving experts in “initial access” break-ins the ability to focus on this task with increasing intensity.”

Rory Bathgate is Features and Multimedia Editor at ITPro, overseeing all in-depth content and case studies. He can also be found co-hosting the ITPro Podcast with Jane McCallion, swapping a keyboard for a microphone to discuss the latest learnings with thought leaders from across the tech sector.
In his free time, Rory enjoys photography, video editing, and good science fiction. After graduating from the University of Kent with a BA in English and American Literature, Rory undertook an MA in Eighteenth-Century Studies at King’s College London. He joined ITPro in 2022 as a graduate, following four years in student journalism. You can contact Rory at rory.bathgate@futurenet.com or on LinkedIn.
-
Tomorrow's fraud techniquesITPro Podcast Leaders need to proactive as attackers launch more consistent, sophisticated attacks
-
Met Office hails huge efficiency gains in first year of cloud supercomputing with Microsoft AzureNews In moving to the cloud, the Met Office has bolstered operational resilience and helped to deliver more accurate forecasts
-
The rise of teen hackers ‘makes for a good headline’, but cyber crime activities peak later in lifeNews With family responsibilities and mortgages to pay, it's not teenagers dishing out malware or carrying out cyber extortion
-
Ransomware gangs are using employee monitoring software as a springboard for cyber attacksNews Two attempted attacks aimed to exploit Net Monitor for Employees Professional and SimpleHelp
-
Ransomware gangs are sharing virtual machines to wage cyber attacks on the cheap – but it could be their undoingNews Thousands of attacker servers all had the same autogenerated Windows hostnames, according to Sophos
-
Google issues warning over ShinyHunters-branded vishing campaignsNews Related groups are stealing data through voice phishing and fake credential harvesting websites
-
The FBI has seized the RAMP hacking forum, but will the takedown stick? History tells us otherwiseNews Billing itself as the “only place ransomware allowed", RAMP catered mainly for Russian-speaking cyber criminals
-
Everything we know so far about the Nike data breachNews Hackers behind the WorldLeaks ransomware group claim to have accessed sensitive corporate data
-
There’s a dangerous new ransomware variant on the block – and cyber experts warn it’s flying under the radarNews The new DeadLock ransomware family is taking off in the wild, researchers warn
-
Hacker offering US engineering firm data online after alleged breachNews Data relating to Tampa Electric Company, Duke Energy Florida, and American Electric Power was allegedly stolen