Hive Ransomware Targets Linux: Bugs, New Features, and Industry Shift

Security researchers at ESET reveal that the Hive ransomware group has expanded its attacks to Linux and FreeBSD systems, releasing a buggy yet feature‑rich Linux variant written in Go, while noting a broader industry trend of ransomware operators developing Linux encryptors to compromise virtualized server environments.

MaGe Linux Operations
MaGe Linux Operations
MaGe Linux Operations
Hive Ransomware Targets Linux: Bugs, New Features, and Industry Shift

ESET, a Slovak internet security firm, reported that the Hive ransomware group has started targeting Linux and FreeBSD platforms, releasing new malicious variants for encryption, although the new encryption engine still lacks some functionality.

Analysis revealed a critical bug in the Linux version: when the malware is executed via an explicit path, the encryption process fails entirely.

The Linux variant automatically supports a single command‑line argument ( -no-wipe), whereas the Windows version offers up to five execution options such as terminating processes or skipping disk cleanup.

Without root privileges the Linux ransomware cannot trigger encryption because it attempts to delete the ransom note on the root filesystem.

ESET’s lab noted that, like the Windows version, the Linux binaries are written in Go but heavily obfuscated—likely using the gobfuscate tool—to hide strings, package names and function identifiers.

These developments reflect a broader shift of ransomware operators toward Linux servers. Since at least June 2021 Hive has attacked more than 30 organisations, and many other groups—including REvil, Babuk, RansomExx/Defray, Mespinoza, GoGoogle, DarkSide, Hellokitty, Snatch, PureLocker, HelloKitty and Blackmate—have also deployed Linux encryptors, often targeting VMware ESXi virtual machines.

Researchers observe that many of these Linux variants contain bugs that can corrupt victim files during encryption, confirming the trend that ransomware gangs are increasingly focusing on virtualized Linux environments.

Original Source

Signed-in readers can open the original source through BestHub's protected redirect.

Sign in to view source
Republication Notice

This article has been distilled and summarized from source material, then republished for learning and reference. If you believe it infringes your rights, please contactadmin@besthub.devand we will review it promptly.

GoHiveinformation securityVirtualizationmalware analysisransomware
MaGe Linux Operations
Written by

MaGe Linux Operations

Founded in 2009, MaGe Education is a top Chinese high‑end IT training brand. Its graduates earn 12K+ RMB salaries, and the school has trained tens of thousands of students. It offers high‑pay courses in Linux cloud operations, Python full‑stack, automation, data analysis, AI, and Go high‑concurrency architecture. Thanks to quality courses and a solid reputation, it has talent partnerships with numerous internet firms.

0 followers
Reader feedback

How this landed with the community

Sign in to like

Rate this article

Was this worth your time?

Sign in to rate
Discussion

0 Comments

Thoughtful readers leave field notes, pushback, and hard-won operational detail here.