Ransomware negotiation(s) with  hive



Hello and welcome to Hive. How may I help you?

13 November 2021 13:53
Avatar
Avatar

Hi, decryption key price?

13 November 2021 13:54
Avatar

how many files are stolen? and can you share some file names?

13 November 2021 13:58
Avatar

maybe no ones here

13 November 2021 13:59

Hello

13 November 2021 13:59
Avatar

To decrypt your files you have to pay $20,000,000 in Bitcoin.

13 November 2021 14:00
Avatar
Avatar

thats way too much, can you please discount And please share the hash of the ransomware file so we can at least black list it. You have already stolen everything anyway

13 November 2021 14:01

We don't provide any hashes. Every time the software is unique. There is no need of hashes here. It will not help anyway.

13 November 2021 14:03
Avatar

If you want a discount I would like to see for how much

13 November 2021 14:04
Avatar
Avatar

let me talk to the management

13 November 2021 14:04
Avatar

share some file names?

13 November 2021 14:05

I'll share with you later when my teammate will be online.

13 November 2021 14:05
Avatar
Avatar

ok when should I log back in?

13 November 2021 14:05

I don't know. Maybe today

13 November 2021 14:06
Avatar
Avatar

ok

13 November 2021 14:06
Avatar

please ask him/her to share the file names so I can have them when I login, its not easy to use TOR here

13 November 2021 14:07

Okay, I'll do my best

13 November 2021 14:07
Avatar
Avatar

thanks

13 November 2021 14:08

I have uploaded the list of exfiltrated files.

13 November 2021 16:16
Avatar
Avatar

where? I cant see them

13 November 2021 18:10
Avatar

is it like 100G?

13 November 2021 18:14

It's at the left panel titled Uploaded files

13 November 2021 19:07
Avatar

I uploaded a list of files not the files themselves

13 November 2021 19:27
Avatar
Avatar

yes got it, thanks

14 November 2021 04:38
Avatar

you can delete it now

14 November 2021 04:38
Avatar

Can you please share the hash of the ransomware. SO we can just add it to black list and ask the management for money. They are scared that the payload will come back. If you can't I understand but this will make th eprocess easy

14 November 2021 04:41

We are well-known organization. We honor our agreements. There is no point in the blacklist right now. You need to concentrate on how to collect money.

14 November 2021 04:56
Avatar

I have another option for you. You will give me your email address (protonmail is preferred) and I'll send you new credentials to login. Then I'll upload the encryptor to VirusTotal and provide you a link to it. All necessary hashes will be available there. But to prevent others to login to your customer website you have to get new credentials first.

14 November 2021 07:19
Avatar
Avatar

Here [redacted]@protonmail.com

14 November 2021 08:58
Avatar

just like you wanted ... protonmail

14 November 2021 08:58
Avatar

please keep your word, I will login again in a bit or check my email

14 November 2021 08:59
Avatar

BTW, the site you guys made is beautiful. Better support than normal companies :)

14 November 2021 09:38

Thank you

14 November 2021 09:38
Avatar
Avatar

did you upload the file?

14 November 2021 09:40
Avatar

and why did you change my creds ... are you planing to hack me too ? :(((((

14 November 2021 09:40

The encryptor didn't uploaded yet, looking for it rn.

14 November 2021 09:41
Avatar

What do you mean about creds? From what?

14 November 2021 09:42
Avatar
Avatar

you change the credential to login to this site

14 November 2021 09:43

It was necessary because whether I upload the encryptor other researchers will be able to login and read your conversation.

14 November 2021 09:45
Avatar

It's a potential data leakage so I have prevented it

14 November 2021 09:45
Avatar
Avatar

Thanks

14 November 2021 09:46
Avatar

would you share the link here or email?

14 November 2021 09:50

Here is safe now

14 November 2021 09:50
Avatar
Avatar

ok

14 November 2021 09:51
Avatar

why do you prefer protonmail?

14 November 2021 09:56
Avatar

is it on tor?

14 November 2021 09:56

https://www.virustotal.com/gui/file/12baa6c83e6f8b059e7f14cb67bdad4e917b90bc8a139b5379a4b42a0c92a6be?nocache=1

14 November 2021 09:57
Avatar
Avatar

Thanks. I dont have virus total account but at least I got the hash. Really appreciat eit

14 November 2021 09:58
Avatar

we have mcafee and symantec and nothing prevented this :(

14 November 2021 10:01

Actually I didn't spend too much time to hide it but I will

14 November 2021 10:02
Avatar

What a recovery company are you from?

14 November 2021 10:02
Avatar
Avatar

not from company, directly the SOC team

14 November 2021 10:03

I got it

14 November 2021 10:04
Avatar
Avatar

working with the management to do something

14 November 2021 10:04
Avatar

they may hire someone in hope of recovery.

14 November 2021 10:05

Unfortunately for them there are only two options: 1) start from a scratch 2) purchase the decryption software from us

14 November 2021 10:06
Avatar
Avatar

yes I have provided all the data

14 November 2021 10:07

Recovery companies no matter what they say can't decrypt.

14 November 2021 10:08
Avatar
Avatar

I understand but in the demo they show us how they can do the magic and impress the management

14 November 2021 10:08
Avatar

THey told us that they will recover the keys from the memory and then decrypt files? is that possible?

14 November 2021 10:09

For ESXi servers it's not possible

14 November 2021 10:09
Avatar
Avatar

why not? please educate me to I can understand and tell the management not to waste time. We have way too many vendors here

14 November 2021 10:11

The encryptor software rewrites the key from memory.

14 November 2021 10:12
Avatar
Avatar

what? :( ... liek in simple words please?

14 November 2021 10:13

Array of bytes in memory where the key resides in rewrites to prevent such operation

14 November 2021 10:13
Avatar
Avatar

Thats awesome. Is this for all servers or only esxi?

14 November 2021 17:39

For all of course

14 November 2021 17:50
Avatar
Avatar

so if we end-up hiring a company that charges us $400 an hour, its pretty much useless?

14 November 2021 17:53
Avatar

BTW, the array of memory that you mentioned, these are the public keys or the private keys?

14 November 2021 17:54

Encryptor even don't know anything about private keys. It only has public keys. Public keys need to encrypt random field which uses in encryption process.

14 November 2021 17:57
Avatar

In my opinion spending money to external IT companies will only waste your valuable time.

14 November 2021 17:59
Avatar
Avatar

Thanks, appreciate it. Its clear to me now

14 November 2021 18:00
Avatar

Hey, how much data have you stolen 100Gig?

16 November 2021 06:24
Avatar

And the price you provided $20,000,000 is way too much

16 November 2021 06:25
Avatar

This is 20 million $?????

16 November 2021 06:25

Yes, your company has $2B revenue. We usually rate 1% of revenue

16 November 2021 06:29
Avatar
Avatar

:( And the total you have stolen in GB?

16 November 2021 06:34
Avatar

I am guessing you used the VPN to get on the network. Did you steal the credentials after that? SYmantec and McAfee didn't prevent stealing credentials?

16 November 2021 06:36

We have 32 Gb total. Almost all AntiViruses are useless against real hackers.

16 November 2021 07:40
Avatar
Avatar

unfortunate but true

17 November 2021 05:16
Avatar

For some reason the IT guy told us that they can see certain portion of files and they could be decrypted.

17 November 2021 05:17
Avatar

I think you are only encrypting certain portion of files right? they can see the file content in bigger files

17 November 2021 05:17

There is a spotted encryption mechanism. If you are talking about ESXi files then I don't think they can. Some text files - yes

17 November 2021 05:31
Avatar
Avatar

I mean the big files are not fully encrypted. They are encypted at the header and then footer I think ... but in the middle one can see the text.

17 November 2021 05:35

It's true. First 4Kb, the last, and a few blocks in the middle

17 November 2021 07:33
Avatar
Avatar

But this is nto true for ESXi files? everything for them is encrypted?

17 November 2021 08:34
Avatar

also how efficient is your encryption process? are you faster than lockbit2.0?

17 November 2021 08:36
Avatar

we also got one file for lockbit but was protected that was few weeks ago

17 November 2021 08:37

I didn't compare it with lockbit but my software is quite fast, especially ESXi

17 November 2021 09:36
Avatar

How is it going with decision making?

17 November 2021 09:38
Avatar
Avatar

its slow, we provided all the data and making sure they understand the complexity

17 November 2021 09:43
Avatar

But for the esxi part, you don't use partial encryption? and everything is encrypted?

17 November 2021 09:44
Avatar

not just 4kb header etc

17 November 2021 09:44
Avatar

can you please explain 2 things to understand . Explain a bit more on how you re-write the keys in the memory and the efficiency of esxi encryption. That way I can explain to everyone as well, that no hope for recovery

17 November 2021 10:04
Avatar

most probly I will ask for discount shirtly

17 November 2021 10:05

It's very simple. ESXi files especially virtual drives are very fragile. Even few changes make them unreadable because it has a binary structure. ESXi was encrypted using spot method. 4 Kb of beginning of the files, 4 Kb of ending of the file and along file. Totally 100 Kb over the each file is encrypted. It's a quite enough.

17 November 2021 10:52
Avatar
Avatar

cool and the memory re-writing? as I understand you are not creating a new key for each file

17 November 2021 10:53
Avatar

The memory overwrite is my last question. So I can make sure the SOC team understands

17 November 2021 11:02

When encryptor starts it creates a random field which will be used in encryption process. It is static. After encryption process finishes it rewrites to prevent restoration process. RSA keys private and public only use to encrypt/decrypt the random field. Only knowing the field it's possible to decrypt files. Encryptor has only public RSA keys, decryptor - private RSA keys.

17 November 2021 11:11
Avatar
Avatar

by random fields u mean aes?

17 November 2021 11:13

No, a truly cryptographic random field.

17 November 2021 11:13
Avatar
Avatar

like PRNG or truly random numbers?

17 November 2021 11:15

Of course not PRNG:)

17 November 2021 11:15
Avatar
Avatar

:(

17 November 2021 11:15
Avatar

can you give me an example

17 November 2021 11:15
Avatar

so you have the origanal private key. The ransomware generates fields that will encrypt files? are these fields used as keys? for aes?

17 November 2021 11:16
Avatar

You are one smart guy

17 November 2021 11:17

Actually I already disclose you a lot of details which was never disclosed to anyone. I think it's enough to make a decision.

17 November 2021 11:17
Avatar
Avatar

Thanks

17 November 2021 11:18

AES is a chiper, I use a different one - some kind of Vernam's chiper. It's impossible to decrypt without knowing the keys.

17 November 2021 11:18
Avatar
Avatar

that means only one key will be used for all files and then re-written

17 November 2021 11:27
Avatar

so no way to get back

17 November 2021 11:27

In simplified version the key used to encrypt all files. It exports to the disk using a few RSA public keys applied. Then encryption process follows. After that the key rewrites to prevent recovery from memory. Decryption software has RSA private keys to initially decrypt the exported key.

17 November 2021 11:31
Avatar
Avatar

Whats the BTC address or wallet?

17 November 2021 11:40

I made an offer at the right panel

17 November 2021 11:51
Avatar
Avatar

you came into the network via global protect. Are you still on the network?

17 November 2021 11:54

No

17 November 2021 11:55
Avatar
Avatar

you are very honest for a hacker

17 November 2021 11:55

We are all honest who works at Hive

17 November 2021 11:56
Avatar
Avatar

but they say you hacked hospitals like [redacted] etc

17 November 2021 11:57

Yes, we attack every targets, we have no limits here. It's not related with honesty

17 November 2021 11:58
Avatar
Avatar

Got it

17 November 2021 11:59
Avatar

I think the time is up :(

20 November 2021 18:07

Don't worry you have time. Tell me how is it going with upper management please

20 November 2021 19:58
Avatar
Avatar

working on it, tough situation

24 November 2021 04:57

Hi, how is it going?

29 November 2021 07:02
Avatar
Avatar

good thanks

3 December 2021 15:53
Avatar

how r u

3 December 2021 15:56

I'm good too. I just wanted to know to what direction your company inclined right now. By the way, what about a recovery process from memory from recovery company you told earlier?

3 December 2021 16:17
Avatar
Avatar

They think the recovery is possible

5 December 2021 05:26
Avatar

also backup etc

5 December 2021 05:26

Let's play with the price. I think both your management and our side want to resolve this as quick as possible

5 December 2021 06:06
Avatar
Avatar

Whats the best price?

6 December 2021 08:57
Avatar

I am not sure if 333 is even remotely possible

6 December 2021 08:58
Avatar

They won't even consider 80 a possibility

6 December 2021 08:58 Read

I can offer you $3,000,000 in Bitcoin.

6 December 2021 11:01
Avatar

This information is provided by Valéry Marchive & Julien Mousqueton