Hunters International Rebrands as World Leaks: The Shift to Pure Data Extortion

Listen to this Post

Featured Image

Introduction:

The ransomware landscape is evolving rapidly, with threat actors adapting to bypass traditional defenses. Hunters International, a notorious Ransomware-as-a-Service (RaaS) group, has rebranded as World Leaks, shifting from file encryption to pure data extortion. This strategic pivot makes attacks stealthier, forcing organizations to rethink detection and mitigation strategies.

Learning Objectives:

  • Understand the implications of ransomware groups moving to pure data extortion.
  • Learn detection techniques to identify exfiltration attempts.
  • Implement defensive measures to protect against data theft.

You Should Know:

1. Monitoring Outbound Data Flows

Command (Linux):

sudo tcpdump -i eth0 -w /var/log/outbound_traffic.pcap port 443 or port 80 

What This Does:

Captures HTTP/HTTPS outbound traffic, which can help detect unusual data transfers.

Steps:

1. Run the command on a critical server.

  1. Analyze the `.pcap` file with Wireshark for large or suspicious transfers.
  2. Set up automated alerts for abnormal data volumes.

2. Detecting Credential Dumping with EDR/XDR

Windows (PowerShell):

Get-WinEvent -FilterHashtable @{LogName='Security'; ID=4688} | Where-Object {$_.Message -like "lsass.exe"} 

What This Does:

Identifies processes accessing `lsass.exe` (a common target for credential theft).

Steps:

1. Run in an administrative PowerShell session.

2. Investigate any unexpected `lsass.exe` access.

3. Integrate with SIEM for real-time alerts.

3. Deploying Decoy Files for Early Detection

Bash Script to Create Fake Sensitive Files:

!/bin/bash 
mkdir -p /var/hr/confidential 
echo "FAKE_CREDS: admin:password123" > /var/hr/confidential/credentials.txt 
chmod 600 /var/hr/confidential/credentials.txt 

What This Does:

Creates bait files that, if accessed, trigger alerts.

Steps:

1. Place decoys in high-value directories (HR, finance).

  1. Monitor file access logs (auditd on Linux, SACL on Windows).
  2. Configure alerts for any access to these files.

4. Enforcing Exfiltration Controls with Firewall Rules

Linux (iptables):

sudo iptables -A OUTPUT -p tcp --dport 443 -m limit --limit 50/minute -j LOG --log-prefix "HTTPS-EXFIL:" 

What This Does:

Logs high-frequency HTTPS outbound connections (possible data exfiltration).

Steps:

1. Apply the rule to critical servers.

2. Check logs (`/var/log/syslog`) for repeated connections.

3. Block suspicious IPs if detected.

5. Detecting Large File Compression (Pre-Exfiltration)

Windows (Command Prompt):

forfiles /P C:\ /S /M .zip /C "cmd /c echo @path @fsize" | findstr /R /C:"[0-9]{7,}" 

What This Does:

Finds unusually large ZIP files (>1MB) that may indicate data staging.

Steps:

1. Run periodically on file servers.

2. Investigate any large, unexpected archives.

3. Pair with EDR for automated blocking.

What Undercode Say:

  • Key Takeaway 1: The shift to pure extortion means backups alone are no longer sufficient—data theft must be detected before exfiltration.
  • Key Takeaway 2: Proactive monitoring (EDR/XDR, decoy files, traffic analysis) is now critical to combat stealthy attacks.

Analysis:

World Leaks’ strategy reflects broader ransomware trends—attackers are opting for low-visibility, high-impact methods. Organizations must prioritize:
– Enhanced logging (to catch credential dumping and data staging).
– Behavioral detection (rather than relying on signature-based tools).
– Deception tech (decoys to lure attackers into revealing themselves).

Prediction:

As more groups adopt this model, we’ll see:

  • Increased regulatory pressure on breach disclosure timelines.
  • More AI-driven anomaly detection to combat stealthy exfiltration.
  • Rise in insider threats as attackers recruit employees to bypass defenses.

Staying ahead requires a shift from reactive to preemptive cybersecurity strategies.

Reference: Hunters International Rebrands as World Leaks

IT/Security Reporter URL:

Reported By: Garettm Hunters – Hackers Feeds
Extra Hub: Undercode MoN
Basic Verification: Pass ✅

🔐JOIN OUR CYBER WORLD [ CVE News • HackMonitor • UndercodeNews ]

💬 Whatsapp | 💬 Telegram

📢 Follow UndercodeTesting & Stay Tuned:

𝕏 formerly Twitter 🐦 | @ Threads | 🔗 Linkedin