25% off all training courses Offer ends May 29, 2026
View HIPAA Courses
25% off all training courses
View HIPAA Courses
Offer ends May 29, 2026

The HIPAA Journal is the leading provider of HIPAA training, news, regulatory updates, and independent compliance advice.

Ransomware Group Targets IT Workers by Impersonating Legitimate Scanning Tool

The Hunters International threat group is targeting IT workers by impersonating a legitimate IP and port scanning tool to deliver malware to gain initial access to networks. Hunters International is a ransomware group that first emerged in October 2023. The group has been linked with the Hive ransomware group, which was the subject of a law enforcement operation and shut down in January 2023. While security researchers have suggested Hunters International was a rebrand of Hive due to a 60% code overlap with Hive, the group claims to have purchased the Hive code and that it is an independent group.

Hunter’s International is not the most prolific ransomware group but has conducted more than 130 attacks so far this year. As the group’s name suggests, attacks are conducted worldwide, with the threat actor claiming victims in around 30 countries. The group primarily hunts for data, which is exfiltrated from victims’ networks. Threats are issued to publish the stolen data if a ransom is not paid, with the attacks often including file encryption.

Hunters International poses a significant threat to the healthcare and public health (HPH) sector and has already conducted several attacks on U.S. healthcare organizations including Arisa Health, Integris Health, Northeast Rehabilitation Hospital Network, Fred Hutchison Cancer Center, Covenant Care, Crystal Lake Health Centers, Therapeutic Health Services, BeneCare Dental Insurance, and Betances Health Center.

The group’s tactics, techniques, and procedures (TTPs) are constantly evolving. The group is known to gain initial access via phishing emails, social engineering, supply chain attacks, and Remote Desktop Protocol (RDP), and now a new method of gaining initial access has been identified by security researchers at Quorum Cyber. During a recent ransomware investigation, the researchers identified a new malware variant that has not previously been linked with any other threat group. The malware is written in C# and has been dubbed SharpRhino, and is a Remote Access Trojan that provides the group with initial access to victims’ networks.

Get The FREE
HIPAA Compliance Checklist

Immediate Delivery of Checklist Link To Your Email Address

Please Enter Correct Email Address

Your Privacy Respected

HIPAA Journal Privacy Policy

Hunters International is targeting IT workers, as their accounts are likely to have high privileges. The malware is delivered via a typosquatting domain that masquerades as Angry IP Scanner, a legitimate IP address and port scanning tool. When the malware is executed, it establishes persistence by modifying the registry and gives the hackers remote access to the device.

The file downloaded from the typosquatting domain is named ipscan-3.9.1-setup.exe, and is a 32-bit Portable Executable (PE) Nullsoft installer with a self-extracting password-protected archive. The installer drops a LogUpdate.bat file which executes PowerShell scripts to compile C# into memory for malware execution. The malware is able to execute PowerShell commands on the compromised device and is eventually used to deliver the ransomware payload.

Quorum Cyber has shared its analysis of the malware and Indicators of Compromise (IoCs) for network defenders here.

Author: Steve Alder is the editor-in-chief of The HIPAA Journal. Steve is responsible for editorial policy regarding the topics covered in The HIPAA Journal. He is a specialist on healthcare industry legal and regulatory affairs, and has 10 years of experience writing about HIPAA and other related legal topics. Steve has developed a deep understanding of regulatory issues surrounding the use of information technology in the healthcare industry and has written hundreds of articles on HIPAA-related topics. Steve shapes the editorial policy of The HIPAA Journal, ensuring its comprehensive coverage of critical topics. Steve Alder is considered an authority in the healthcare industry on HIPAA. The HIPAA Journal has evolved into the leading independent authority on HIPAA under Steve’s editorial leadership. Steve manages a team of writers and is responsible for the factual and legal accuracy of all content published on The HIPAA Journal. Steve holds a Bachelor’s of Science degree from the University of Liverpool. You can connect with Steve via LinkedIn or email via stevealder(at)hipaajournal.com

x

Is Your Organization HIPAA Compliant?

Find Out With Our Free HIPAA Compliance Checklist

Get Free Checklist