Hunters International attacks Wapiti Energy
Incident Date:
February 15, 2024
Overview
Title
Hunters International attacks Wapiti Energy
Victim
Wapiti Energy
Attacker
Hunters International
Location
First Reported
February 15, 2024
Hunters International Ransomware Attack on Wapiti Energy
The Hunters International ransomware group has attacked Wapiti Energy. No further details have been disclosed. Wapiti Energy is a privately held oil & gas company focused on strategic exploration production throughout the United States with primary focuses in the Gulf Coast and Rocky Mountain regions. Wapiti has a staff of professionals whose knowledge, skill, and dedication allow us to uncover and develop value for our stakeholders. Throughout its history, it has managed successful partnerships with industry, private equity, and high-net-worth individuals.
Background on Hunters International
Hunters International, a Ransomware-as-a-Service (RaaS) group, emerged in Q3 of 2023 after the discovery of source code bearing resemblances to the infamous Hive ransomware strain. In October 2023, a security researcher's analysis of the ransomware used by Hunters revealed significant code overlaps with Hive ransomware. Subsequent analysis by Bitdefender came to the same findings, leading researchers to conclude that Hive operators have handed off their malicious tool to another threat actor. Despite this, Hunters International has denied any ties to the Hive operation.
Modus Operandi of Hunters International
Intelligence suggests that Hunters International ransomware primarily aims to exfiltrate target data and extort victims with ransom demands for its return. One reported incident involved a plastic surgery clinic in the US, where approximately 248,000 files, including patient names and addresses, were exfiltrated. The ransomware encrypts files with the ".LOCKED" extension and leaves "Contact Us.txt" files in directories, instructing victims on how to initiate negotiation on the dark web. Successful exploitation by Hunters International typically results in significant data exfiltration prior to issuing a ransom demand, often tailored to the perceived value of the compromised organization.
Recent Ransomware Attacks
The Recent Ransomware Attacks (RRA) site acts as a watchtower, providing you with near real-time ransomware tracking of attacks, groups and their victims. Given threat actors’ overarching, lucrative success so far, ransomware attacks have become the most ubiquitous, and financially and informationally impactful cyber threat to businesses and organizations today.
The site’s data is generated based on hosting choices of real-world threat actors, and a handful of other trackers. While sanitization efforts have been taken, we cannot guarantee 100% accuracy of the data. Attack updates will be made as source data is reported by reputable sources. By viewing, accessing, or using RRA you acknowledge you are doing so at your own risk.