{"id":45635,"date":"2022-03-09T00:00:00","date_gmt":"2022-03-09T00:00:00","guid":{"rendered":"urn:uuid:5f78002a-1a87-3cb6-8b79-29e7ac18eeaa"},"modified":"2022-03-09T00:00:00","modified_gmt":"2022-03-09T00:00:00","slug":"new-nokoyawa-ransomware-possibly-related-to-hive","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/new-nokoyawa-ransomware-possibly-related-to-hive\/","title":{"rendered":"New Nokoyawa Ransomware Possibly Related to Hive"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/22\/c\/new-nokoyawa-ransomware-possibly-related-to-hive-\/nokoyawa-641.png\"><\/p>\n<div><img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/22\/c\/new-nokoyawa-ransomware-possibly-related-to-hive-\/nokoyawa-641.png\" class=\"ff-og-image-inserted\"><\/div>\n<p>Hive, which is one of the more notable <a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/definition\/ransomware\">ransomware families<\/a> of 2021, made waves in the latter half of the year after <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/hive-ransomware-enters-big-league-with-hundreds-breached-in-four-months\/\">breaching over 300 organizations in just four months<\/a> \u2014 allowing the group to earn what could potentially be millions of US dollars in profit. In March 2022, we came across evidence that another, relatively unknown, ransomware known as Nokoyawa is likely connected with Hive, as the two families share some striking similarities in their attack chain, from the tools used to the order in which they execute various steps. Currently, the majority of Nokoyawa\u2019s targets are located in South America, primarily in Argentina.<\/p>\n<p>Some of the indicators we\u2019ve observed being shared by both Nokoyawa and Hive include the <a href=\"https:\/\/www.trendmicro.com\/en_us\/research\/21\/g\/tracking_cobalt_strike_a_vision_one_investigation.html\">use of Cobalt Strike<\/a> as part of the arrival phase of the attack, as well as the use of legitimate, but commonly abused, tools such as the anti-rootkit scanners GMER and PC Hunter for defense evasion. Other steps, such as information gathering and lateral deployment, are also similar.<\/p>\n<p>The operators of the Hive ransomware are known to use other tools \u2014 such as NirSoft and MalXMR miner \u2014 to enhance their attack capabilities depending on the victim environment. Based on our analysis, Nokoyawa also does the same thing based on its victims. We\u2019ve observed the ransomware leverage other tools such as. Mimikatz, Z0Miner, and Boxter<\/p>\n<p>We also found evidence based on one of the IP addresses used by Nokoyawa that the two ransomware families share the same infrastructure.<\/p>\n<p>Although we are not certain how Nokoyawa is delivered to its victims, given the similarities with Hive, it\u2019s likely that it uses <a href=\"https:\/\/www.ic3.gov\/Media\/News\/2021\/210825.pdf\">similar methods such as phishing emails<\/a> for arrival.<\/p>\n<table border=\"1\" cellspacing=\"0\" cellpadding=\"0\" width=\"100%\">\n<tbody readability=\"6.7727272727273\">\n<tr>\n<td>\n<p><b>Indicator<\/b><\/p>\n<\/td>\n<td width=\"208\" valign=\"top\">\n<p><b>Hive<\/b><\/p>\n<\/td>\n<td width=\"208\" valign=\"top\">\n<p><b>Nokoyawa<\/b><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"208\" valign=\"top\">\n<p>Cobalt Strike (arrival)<\/p>\n<\/td>\n<td width=\"208\" valign=\"top\">\n<p>Yes<\/p>\n<\/td>\n<td width=\"208\" valign=\"top\">\n<p>Yes<\/p>\n<\/td>\n<\/tr>\n<tr readability=\"8.25\">\n<td width=\"208\" valign=\"top\" readability=\"5\">\n<p>Coroxy malware (deployment of PowerShell commands and scripts)<\/p>\n<\/td>\n<td width=\"208\" valign=\"top\" readability=\"6.070796460177\">\n<p>Other researchers have flagged this malware as being <a href=\"https:\/\/www.virustotal.com\/gui\/user\/nw_ir\/comments\">related to Hive<\/a>, though we have not confirmed this ourselves<\/p>\n<\/td>\n<td width=\"208\" valign=\"top\">\n<p>Yes<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"208\" valign=\"top\">\n<p>GMER (defense evasion)<\/p>\n<\/td>\n<td width=\"208\" valign=\"top\">\n<p>Yes<\/p>\n<\/td>\n<td width=\"208\" valign=\"top\">\n<p>Yes<\/p>\n<\/td>\n<\/tr>\n<tr readability=\"3\">\n<td width=\"208\" valign=\"top\" readability=\"5\">\n<p>PC Hunter (info gathering and defense evasion)<\/p>\n<\/td>\n<td width=\"208\" valign=\"top\">\n<p>Yes<\/p>\n<\/td>\n<td width=\"208\" valign=\"top\">\n<p>Yes<\/p>\n<\/td>\n<\/tr>\n<tr readability=\"3\">\n<td width=\"208\" valign=\"top\" readability=\"5\">\n<p>PowerShell Scripts (info gathering)<\/p>\n<\/td>\n<td width=\"208\" valign=\"top\">\n<p>Yes<\/p>\n<\/td>\n<td width=\"208\" valign=\"top\">\n<p>Yes<\/p>\n<\/td>\n<\/tr>\n<tr readability=\"3\">\n<td width=\"208\" valign=\"top\" readability=\"5\">\n<p>PsExec (lateral deployment of Ransomware)<\/p>\n<\/td>\n<td width=\"208\" valign=\"top\">\n<p>Yes<\/p>\n<\/td>\n<td width=\"208\" valign=\"top\">\n<p>Yes<\/p>\n<\/td>\n<\/tr>\n<tr readability=\"3\">\n<td width=\"208\" valign=\"top\" readability=\"5\">\n<p>Filename for Ransom Payload (xxx.exe)<\/p>\n<\/td>\n<td width=\"208\" valign=\"top\">\n<p>Yes<\/p>\n<\/td>\n<td width=\"208\" valign=\"top\">\n<p>Yes<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h5>Table 1. Similarities in the attack chain of Hive and Nokoyawa<\/h5>\n<p>Taking each individual step into account, the similarities might not seem as apparent \u2014 for example, Cobalt Strike is a very popular post exploitation tool that has been used by other ransomware gangs \u2014 but when taking the whole picture into account, it\u2019s clear to see that the two ransomware families are connected. What the information gathered implies is that it\u2019s likely that the Hive ransomware\u2019s operators have begun using another ransomware family.<\/p>\n<p>Note that we have not found any evidence that Nokoyawa has been using the double extortion technique \u2014 where the ransomware operator threatens to release critical information on a leak site in addition to encoding files \u2014 unlike Hive, which has been found to be integrating it in its attacks.<\/p>\n<p>Ransomware is one of the most destructive malware types in the wild today due to its ability to compromise and leak critical data. Therefore, organizations should ensure that their information is as safe as possible from ransomware attacks. These security recommendations can help maximize their security implementation with relatively little costs:<\/p>\n<ul>\n<li><span class=\"rte-red-bullet\">Enabling multifactor authentication can prevent malicious actors from compromising user accounts as part of their infiltration process.<\/span><\/li>\n<li><span class=\"rte-red-bullet\">Users should be wary of opening unverified emails. Embedded links should never be clicked and attached files should never be opened without the proper precautions and verification as these can kickstart the ransomware installation process.<\/span><\/li>\n<li><span class=\"rte-red-bullet\">Organizations should always adhere to the <a href=\"https:\/\/www.trendmicro.com\/vinfo\/ph\/security\/news\/virtualization-and-cloud\/best-practices-backing-up-data#:~:text=If%20a%20company%20needs%20to,formats%20(rule%20%232).\">3-2-1 rule<\/a>: Create three backup copies on two different file formats, with one of the backups in a separate location.<\/span><\/li>\n<li><span class=\"rte-red-bullet\">Patching and updating software and other systems at the soonest possible time can minimize the chance of a successful vulnerability exploitation that can lead down the road to a ransomware infection.<\/span><\/li>\n<li><span class=\"rte-red-bullet\">Organizations can better protect themselves from ransomware attacks if they implement multilayered security setups that combine elements such as the automated detection of files and other indicators with constant monitoring for the presence of weaponized legitimate tools in their IT environment.<\/span><\/li>\n<\/ul>\n<p>Correlating two different attacks, such as the one we\u2019ve done in this blog entry with Hive and Nokoyawa, are made much easier with multilayered detection and response solutions such as <a href=\"https:\/\/www.trendmicro.com\/en_ph\/business\/products\/detection-response.html\">Trend Micro Vision One\u2122<\/a>, which is a purpose-built threat defense platform that provides added value and new benefits beyond extended detection and response (XDR) solutions. This technology provides powerful XDR capabilities that collect and automatically correlate data across multiple security layers \u2014 email, endpoints, servers, cloud workloads, and networks \u2014 to prevent attacks via automated protection while also ensuring that no significant incidents go unnoticed.<\/p>\n<ul>\n<li><span class=\"rte-red-bullet\">hxxp:\/\/185.150.117[.]186:80\/asdfgsdhsdfgsdfg (Cobalt Strike download)<\/span><\/li>\n<\/ul>\n<table border=\"1\" cellspacing=\"0\" cellpadding=\"0\" width=\"50%\">\n<tbody readability=\"8\">\n<tr>\n<td>\n<p><b>Malware<\/b><\/p>\n<\/td>\n<td width=\"203\" valign=\"top\">\n<p><b>SHA256<\/b><\/p>\n<\/td>\n<td width=\"203\" valign=\"top\">\n<p><b>Detection<\/b><\/p>\n<\/td>\n<\/tr>\n<tr readability=\"6\">\n<td width=\"203\" valign=\"top\">\n<p>Exploit Agent<\/p>\n<\/td>\n<td width=\"203\" valign=\"top\" readability=\"5\">\n<p>a70729b3241154d81f2fff506e5434be0a0c381354a84317958327970a125507<\/p>\n<\/td>\n<td width=\"203\" valign=\"top\" readability=\"5\">\n<p>Trojan.Win64.NEKTO.YACCAT<\/p>\n<\/td>\n<\/tr>\n<tr readability=\"6\">\n<td width=\"203\" valign=\"top\">\n<p>Coroxy Dropper<\/p>\n<\/td>\n<td width=\"203\" valign=\"top\" readability=\"5\">\n<p>2ef9a4f7d054b570ea6d6ae704602b57e27dee15f47c53decb16f1ed0d949187<\/p>\n<\/td>\n<td width=\"203\" valign=\"top\" readability=\"5\">\n<p>Trojan.Win32.COROXY.SMYXBC3A<\/p>\n<\/td>\n<\/tr>\n<tr readability=\"6\">\n<td width=\"203\" valign=\"top\">\n<p>Coroxy<\/p>\n<\/td>\n<td width=\"203\" valign=\"top\" readability=\"5\">\n<p>c170717a69847bb7b050832c55fcd2a214e9180c8cde5f86088bd4e5266e2fd9<\/p>\n<\/td>\n<td width=\"203\" valign=\"top\" readability=\"5\">\n<p>Backdoor.Win64.COROXY.YACCAT<\/p>\n<\/td>\n<\/tr>\n<tr readability=\"3\">\n<td width=\"203\" valign=\"top\">\n<p>DataSpy<\/p>\n<\/td>\n<td width=\"203\" valign=\"top\" readability=\"5\">\n<p>a290ce75c6c6b37af077b72dc9c2c347a2eede4fafa6551387fa8469539409c7<\/p>\n<\/td>\n<td width=\"203\" valign=\"top\">\n<p>TrojanSpy.PS1.DATASPY.B<\/p>\n<\/td>\n<\/tr>\n<tr readability=\"3\">\n<td width=\"203\" valign=\"top\">\n<p>Nokoyawa<\/p>\n<\/td>\n<td width=\"203\" valign=\"top\" readability=\"5\">\n<p>32c2ecf9703aec725034ab4a8a4c7b2944c1f0b7<\/p>\n<\/td>\n<td width=\"203\" valign=\"top\">\n<p>Ransom.Win64.NOKO.YACBL<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p> Read More <a href=\"https:\/\/www.trendmicro.com\/en_us\/research\/22\/c\/nokoyawa-ransomware-possibly-related-to-hive-.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In March 2022, we came across evidence that another, relatively unknown, ransomware known as Nokoyawa is likely connected with Hive, as the two families share some striking similarities in their attack chain, from the tools used to the order in which they execute various steps. Read More HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":45636,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[61],"tags":[9510,9508,9539,9509],"class_list":["post-45635","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-trendmicro","tag-trend-micro-research-articles-news-reports","tag-trend-micro-research-endpoints","tag-trend-micro-research-ransomware","tag-trend-micro-research-research"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>New Nokoyawa Ransomware Possibly Related to Hive 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/new-nokoyawa-ransomware-possibly-related-to-hive\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"New Nokoyawa Ransomware Possibly Related to Hive 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/new-nokoyawa-ransomware-possibly-related-to-hive\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2022-03-09T00:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/22\/c\/new-nokoyawa-ransomware-possibly-related-to-hive-\/nokoyawa-641.png\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/new-nokoyawa-ransomware-possibly-related-to-hive\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/new-nokoyawa-ransomware-possibly-related-to-hive\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"New Nokoyawa Ransomware Possibly Related to Hive\",\"datePublished\":\"2022-03-09T00:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/new-nokoyawa-ransomware-possibly-related-to-hive\\\/\"},\"wordCount\":890,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/new-nokoyawa-ransomware-possibly-related-to-hive\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/new-nokoyawa-ransomware-possibly-related-to-hive.png\",\"keywords\":[\"Trend Micro Research : Articles, News, Reports\",\"Trend Micro Research : Endpoints\",\"Trend Micro Research : Ransomware\",\"Trend Micro Research : Research\"],\"articleSection\":[\"TrendMicro\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/new-nokoyawa-ransomware-possibly-related-to-hive\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/new-nokoyawa-ransomware-possibly-related-to-hive\\\/\",\"name\":\"New Nokoyawa Ransomware Possibly Related to Hive 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/new-nokoyawa-ransomware-possibly-related-to-hive\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/new-nokoyawa-ransomware-possibly-related-to-hive\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/new-nokoyawa-ransomware-possibly-related-to-hive.png\",\"datePublished\":\"2022-03-09T00:00:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/new-nokoyawa-ransomware-possibly-related-to-hive\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/new-nokoyawa-ransomware-possibly-related-to-hive\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/new-nokoyawa-ransomware-possibly-related-to-hive\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/new-nokoyawa-ransomware-possibly-related-to-hive.png\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/new-nokoyawa-ransomware-possibly-related-to-hive.png\",\"width\":641,\"height\":350},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/new-nokoyawa-ransomware-possibly-related-to-hive\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Trend Micro Research : Articles, News, Reports\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/trend-micro-research-articles-news-reports\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"New Nokoyawa Ransomware Possibly Related to Hive\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"New Nokoyawa Ransomware Possibly Related to Hive 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/new-nokoyawa-ransomware-possibly-related-to-hive\/","og_locale":"en_US","og_type":"article","og_title":"New Nokoyawa Ransomware Possibly Related to Hive 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/new-nokoyawa-ransomware-possibly-related-to-hive\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2022-03-09T00:00:00+00:00","og_image":[{"url":"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/22\/c\/new-nokoyawa-ransomware-possibly-related-to-hive-\/nokoyawa-641.png","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/new-nokoyawa-ransomware-possibly-related-to-hive\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/new-nokoyawa-ransomware-possibly-related-to-hive\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"New Nokoyawa Ransomware Possibly Related to Hive","datePublished":"2022-03-09T00:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/new-nokoyawa-ransomware-possibly-related-to-hive\/"},"wordCount":890,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/new-nokoyawa-ransomware-possibly-related-to-hive\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/03\/new-nokoyawa-ransomware-possibly-related-to-hive.png","keywords":["Trend Micro Research : Articles, News, Reports","Trend Micro Research : Endpoints","Trend Micro Research : Ransomware","Trend Micro Research : Research"],"articleSection":["TrendMicro"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/new-nokoyawa-ransomware-possibly-related-to-hive\/","url":"https:\/\/www.threatshub.org\/blog\/new-nokoyawa-ransomware-possibly-related-to-hive\/","name":"New Nokoyawa Ransomware Possibly Related to Hive 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/new-nokoyawa-ransomware-possibly-related-to-hive\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/new-nokoyawa-ransomware-possibly-related-to-hive\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/03\/new-nokoyawa-ransomware-possibly-related-to-hive.png","datePublished":"2022-03-09T00:00:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/new-nokoyawa-ransomware-possibly-related-to-hive\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/new-nokoyawa-ransomware-possibly-related-to-hive\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/new-nokoyawa-ransomware-possibly-related-to-hive\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/03\/new-nokoyawa-ransomware-possibly-related-to-hive.png","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/03\/new-nokoyawa-ransomware-possibly-related-to-hive.png","width":641,"height":350},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/new-nokoyawa-ransomware-possibly-related-to-hive\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Trend Micro Research : Articles, News, Reports","item":"https:\/\/www.threatshub.org\/blog\/tag\/trend-micro-research-articles-news-reports\/"},{"@type":"ListItem","position":3,"name":"New Nokoyawa Ransomware Possibly Related to Hive"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/45635","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=45635"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/45635\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/45636"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=45635"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=45635"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=45635"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}