The US State Department has put forth a $10M reward for information leading to the final takedown of the slippery Hive ransomware gang.
A department spokesperson announced Thursday the agency would fork over up to $10 million to the person who can provide information that will help identify or locate any individual (or individuals) holding key leadership positions in the criminal group.
But there’s more, the State Department said they will also offer up another $5 million to anyone with information that leads to the arrest and/or conviction of a Hive gang member or affiliate.
“Any individual, in any country,” the State department said.
“Hive ransomware attacks have caused major disruptions for more than 1,500 victims in over 80 countries around the world,” according to the agency.
It’s the second such $10 million award offered by the State Department – the first issued last February following a month-long FBI stakeout resulting in the seizure of Hive servers and its dark website.
Hive victims have included include hospitals, school districts, financial firms, and critical infrastructure, even impacting response services during the COVID-19 pandemic.
"In one case, a hospital attacked by Hive ransomware had to resort to analog methods to treat existing patients and was unable to accept new patients immediately following the attack," the reward bulletin said.
Last year's $10M Hive bounty, part of the US Rewards for Justice program, covered any tips about the gang’s possible involvement with foreign governments.
The past January cyber-coup led to the FBI capture of Hive’s notorious decryption keys, which were then handed over to hundreds of victims, thwarting over $130 Million in ransom payments.
“We will continue our investigation and pursue the actors behind Hive until they are brought to justice,” said Assistant Attorney General Kenneth A. Polite, Jr. of the Justice Department’s Criminal Division.
The most recent $10M reward will be funded by the US Department of State’s Transnational Organized Crime Rewards Program (TOCRP).
More from Cybernews:
Subscribe to our newsletter