
➤Summary
Hunters International emerged in October 2023, likely as a rebrand of the Hive ransomware group, following the latter’s dismantling by law enforcement. Initially operating as a Ransomware-as-a-Service (RaaS) with support for data encryption and exfiltration, Hunters International soon evolved its strategy in response to global crackdowns, sanctions, and anti-ransom legislation. By early 2025, the group rebranded again as World Leaks, dropping encryption entirely to focus on pure extortion using advanced data exfiltration tooling and social pressure techniques.
First confirmed attack on a UK company: October 13, 2023. Malware sample uploaded to VirusTotal: October 19, 2023, from a German IP. Affiliate panel note in Russian posted: October 21, 2023. Likely based on the Hive source code, acquired post-shutdown. The group’s infrastructure mimics other ransomware platforms (e.g., LockBit, Qilin), but with notable innovations like modular tooling, categorized disclosure, live chat support, and SOCKS5/Tor-based C2 channels.
Main targets: North America, Europe, Asia. Exclusions (claimed): CIS, Israel, Turkey, Far East. Reality: Leaks from China, Japan, and Turkey contradict exclusions
Victim Industries: Healthcare. Real Estate, Professional Services. Here is the complete victim list:
| Company | Country | Industry |
| Lake Region Healthcare | USA | Healthcare & Research |
| Center for Clinical Research | USA | Healthcare & Research |
| Freedman HealthCare | USA | Healthcare & Research |
| ASC Machine Tools | USA | Manufacturing / Industrial |
| Sylvania | USA | Manufacturing / Industrial |
| Valiant Energy Solutions | USA | Manufacturing / Industrial |
| ASCOMA Cameroon | Cameroon | Manufacturing / Industrial |
| A&R Engineering | USA | Manufacturing / Industrial |
| Zeus TecnologÃa | Mexico | Technology & IT |
| Indigo Group S.A. | Uruguay | Technology & IT |
| Brett-Robinson | USA | Real Estate / Construction |
| A M King | USA | Real Estate / Construction |
| Chain IQ | Switzerland | Real Estate / Construction |
| Kel Campbell | Australia | Transportation & Logistics |
| Canadian Rocky Mountain Resorts | Canada | Hospitality & Retail |
| Jardin De Ville | Canada | Hospitality & Retail |
| AntiFarm | India | Consulting / Services |
| Horecamaterialen De Meester NV | Belgium | Consulting / Services |
Chain IQ is a global strategic procurement services provider headquartered in Switzerland, with a reported revenue of $124.2 million and a workforce of 581 employees. The company manages indirect procurement processes for major international corporations, making it a prime target for attackers looking to exploit confidential supply chain, financial, and client relationship data.
What Was Leaked?
According to the disclosure on the World Leaks extortion platform, the entire dataset has been made available for download. The exposed materials span hundreds of directories and nearly 2 million files.


Among them:
Sample Exposed Files:

Hunters International developed a robust, cross-platform ransomware suite capable of infecting a wide range of environments. This technical versatility allowed affiliates to launch attacks against both standard desktop systems and enterprise infrastructure.
The ransomware was engineered to run on multiple CPU architectures and operating systems, making it highly adaptable across various target environments:
This breadth of support highlights the group’s strategic intent to compromise heterogeneous IT infrastructures, including core servers, virtualized environments, and endpoint systems.
The ransomware used AES (Advanced Encryption Standard) with a unique 128-bit key per file, a common yet effective method to ensure file contents are irreversibly locked without the decryption key.
Several key features define its encryption strategy:
This minimalist and covert encryption approach reflects a trend among modern ransomware groups: stealth over spectacle.
Hunters International’s ransomware includes several command-line interface (CLI) options, enabling granular control over the attack:
One of the group’s most novel features was its “Storage Software” — a post-exfiltration utility used by affiliates to organize and manage stolen data.
Functionality Overview
The Storage Software enables attackers to:
Communication Architecture
The Storage Software communicates securely with the Hunters platform through:
This architecture ensures the attackers maintain tight operational control, while avoiding the risks associated with centralized data warehousing.
Hunters International operated with the efficiency of a software-as-a-service (SaaS) business. The affiliate workflow followed a clear, repeatable structure:
This approach demonstrates a mature criminal business model, prioritizing scalability, modularity, and incentives for affiliate loyalty.
In a bid to increase pressure without triggering law enforcement, Hunters International began using Open Source Intelligence (OSINT) for non-technical extortion tactics.
Strategy
By focusing attacks directly on decision-makers, Hunters International maximized psychological leverage while minimizing visibility — particularly important given that public ransom notes and leaks often trigger compliance and regulatory alerts, which can reduce the chances of payment.
This OSINT-driven model is expected to replace traditional ransom note strategies, aligning with a broader shift toward stealth-focused extortion campaigns.
Your data might already be exposed. Most companies find out too late. Let ’s change that. Trusted by 100+ security teams.
🚀Ask for a demo NOW →Q: What is dark web monitoring?
A: Dark web monitoring is the process of tracking your organization’s data on hidden networks to detect leaked or stolen information such as passwords, credentials, or sensitive files shared by cybercriminals.
Q: How does dark web monitoring work?
A: Dark web monitoring works by scanning hidden sites and forums in real time to detect mentions of your data, credentials, or company information before cybercriminals can exploit them.
Q: Why use dark web monitoring?
A: Because it alerts you early when your data appears on the dark web, helping prevent breaches, fraud, and reputational damage before they escalate.
Q: Who needs dark web monitoring services?
A: MSSP and any organization that handles sensitive data, valuable assets, or customer information from small businesses to large enterprises benefits from dark web monitoring.
Q: What does it mean if your information is on the dark web?
A: It means your personal or company data has been exposed or stolen and could be used for fraud, identity theft, or unauthorized access immediate action is needed to protect yourselfsssss.