{"id":25639,"date":"2022-10-26T00:46:30","date_gmt":"2022-10-26T00:46:30","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/?p=25639"},"modified":"2022-10-26T20:16:21","modified_gmt":"2022-10-26T20:16:21","slug":"data-exfiltration-blackbyte-exbyte-hive-group","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/threats\/data-exfiltration-blackbyte-exbyte-hive-group\/","title":{"rendered":"Data Exfiltration: Symantec Warns of Exbyte Threat as Hive Group Leaks Tata Data"},"content":{"rendered":"\n<p>Symantec researchers are <a href=\"https:\/\/symantec-enterprise-blogs.security.com\/blogs\/threat-intelligence\/blackbyte-exbyte-ransomware\" target=\"_blank\" rel=\"noreferrer noopener\">warning<\/a> that a BlackByte <a href=\"https:\/\/www.esecurityplanet.com\/threats\/ransomware-protection\/\" target=\"_blank\" rel=\"noreferrer noopener\">ransomware<\/a> affiliate has begun using a custom data exfiltration tool, Infostealer.Exbyte, to steal data from victims&#8217; networks as part of their attacks.<\/p>\n\n\n\n<p>Still, as a recent breach of an Indian power company by a different ransomware group demonstrates, the extra effort of stealing data doesn&#8217;t always pay off for the attackers \u2014 even when it leads to embarrassing data leaks for the victim.<\/p>\n\n\n\n<p>What may be most interesting in the ongoing development of exfiltration tools is that some ransomware groups may be about to change tactics entirely \u2014 more on that in a moment.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">BlackByte Exfiltration Tool<\/h2>\n\n\n\n<p>The new BlackByte exfiltration tool performs a series of checks both to make sure it&#8217;s not running in a <a href=\"https:\/\/www.esecurityplanet.com\/endpoint\/sandboxing-advanced-malware-analysis\/\" target=\"_blank\" rel=\"noreferrer noopener\">sandboxed<\/a> environment and to monitor for <a href=\"https:\/\/www.esecurityplanet.com\/products\/antivirus-software\/\" target=\"_blank\" rel=\"noreferrer noopener\">antivirus tools<\/a> \u2013 similar to BlackByte&#8217;s pattern of behavior. Exbyte then searches for document files (.txt, .doc, .pdf), and uploads them to an account on the MEGA cloud storage service.<\/p>\n\n\n\n<p>The Symantec researchers noted that Exbyte follows in the footsteps of several other custom-developed data exfiltration tools, including Exmatter, Ryuk Stealer, and StealBit. &#8220;The fact that actors are now creating custom tools for use in BlackByte attacks suggests that it may be on the way to becoming one of the dominant ransomware threats,&#8221; they wrote.<\/p>\n\n\n\n<p>See also: <a href=\"https:\/\/www.esecurityplanet.com\/threats\/how-to-recover-from-a-ransomware-attack\/\" target=\"_blank\" rel=\"noreferrer noopener\">How to Recover From a Ransomware Attack<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Exfiltration to Replace Ransomware Encryption?<\/h2>\n\n\n\n<p>Cyderes researchers <a href=\"https:\/\/www.cyderes.com\/blog\/threat-advisory-exmatter-data-extortion\/\" target=\"_blank\" rel=\"noreferrer noopener\">said<\/a> the evolution of exfiltration suggests that threat actors may eventually use data theft in place of encryption.<\/p>\n\n\n\n<p>&#8220;With data exfiltration now the norm among threat actors, developing stable, secure, and fast ransomware to encrypt files is a redundant and costly endeavor compared to corrupting files and using the exfiltrated copies as the means of data recovery,&#8221; they wrote.<\/p>\n\n\n\n<p>Ransomware affiliates have &#8220;lost out on profits from successful intrusions due to exploitable flaws in the ransomware deployed, as was the case with BlackMatter,&#8221; they added. &#8220;Eliminating the step of encrypting the data makes the process faster and eliminates the risk of not getting the full payout, or that the victim will find other ways to decrypt the data.&#8221;<\/p>\n\n\n\n<p>&#8220;Data destruction is rumored to be where ransomware is going to go, but we haven\u2019t actually seen it in the wild,&#8221; they noted. &#8220;During a recent incident response, however, Cyderes and Stairwell discovered signs&nbsp; that threat actors are actively in the process of staging and developing this capability.&#8221;<\/p>\n\n\n\n<p>That incident \u2013 involving a BlackCat\/ALPHV\u00a0ransomware investigation \u2013 turned up an exfiltration tool with hardcoded sftp credentials that was analyzed by Stairwell\u2019s Threat Research Team, which found partially-implemented data destruction functionality.<\/p>\n\n\n\n<p>&#8220;The use of data destruction by affiliate-level actors in lieu of <a href=\"https:\/\/www.esecurityplanet.com\/threats\/ransomware-as-a-service-raas-ttp-protections\/\" target=\"_blank\" rel=\"noreferrer noopener\">RaaS<\/a> deployment would mark a large shift in the data extortion landscape and would signal the balkanization of financially-motivated intrusion actors currently working under the banners of RaaS affiliate programs,&#8221; the Stairwell researchers <a href=\"https:\/\/stairwell.com\/news\/threat-research-report-exmatter-future-of-data-extortion\/\" target=\"_blank\" rel=\"noreferrer noopener\">wrote<\/a>.<\/p>\n\n\n\n<p>Exfiltration also adds a key tool to attackers&#8217; arsenals \u2013 Rapid7 recently <a href=\"https:\/\/www.rapid7.com\/blog\/post\/2022\/07\/27\/to-maze-and-beyond-how-the-ransomware-double-extortion-space-has-evolved\/\" target=\"_blank\" rel=\"noreferrer noopener\">warned<\/a> of the ongoing evolution of double extortion, in which ransomware is used both to hold the victim&#8217;s data for ransom and to demand additional money to prevent the public release of sensitive information.<\/p>\n\n\n\n<p>The technique was pioneered, Rapid7 noted, by the Maze ransomware group. &#8220;Throughout most of 2020 Maze was the leader of the double extortion tactic among ransomware groups, accounting for 30% of the 94 reported cases of double extortion between April and December of 2020,&#8221; the researchers wrote.<\/p>\n\n\n\n<p>As decryption fails most of the time, victims don&#8217;t have much incentive to pay for decryption keys, so preventing leaks becomes a more compelling incentive for companies to pay \u2014 and could lead to a completely new ransomware tactic.<\/p>\n\n\n\n<p>Also read: <a href=\"https:\/\/www.esecurityplanet.com\/networks\/decrypt-ransomware-encrypted-files\/\" target=\"_blank\" rel=\"noreferrer noopener\">How to Decrypt Ransomware Files \u2013 And What to Do When That Fails<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">When Extortion Fails and Data Leaks<\/h2>\n\n\n\n<p>The recent attack on India&#8217;s Tata Power by the Hive ransomware group is a vivid example of the extortion threat, though it appears that in this case, the attackers were unsuccessful in their extortion attempts.<\/p>\n\n\n\n<p>In an October 14 <a href=\"https:\/\/archives.nseindia.com\/corporate\/TATAPOWER_14102022190039_SELetter.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">stock filing<\/a> [PDF], the company described the breach as &#8220;a cyber-attack on its IT infrastructure impacting some of its IT systems,&#8221; but didn&#8217;t mention ransomware or data exfiltration.<\/p>\n\n\n\n<p>As the hackers began leaking the data earlier this week, security researcher Dominic Alvieri <a href=\"https:\/\/twitter.com\/AlvieriD\/status\/1584716923253555200\" target=\"_blank\" rel=\"noreferrer noopener\">noted<\/a> that the group claimed to have information on all of Tata Power&#8217;s bank accounts and recent balance details, and researcher Rakesh Krishnan separately <a href=\"https:\/\/twitter.com\/RakeshKrish12\/status\/1584804516398264321\" target=\"_blank\" rel=\"noreferrer noopener\">posted<\/a> four screenshots of leaked bank details, adding that employees&#8217; personal information, engineering drawings, and client contracts were also leaked.<\/p>\n\n\n\n<p>Read next: <a href=\"https:\/\/www.esecurityplanet.com\/products\/best-backup-solutions-for-ransomware-protection\/\">Best Backup Solutions for Ransomware Protection<\/a><\/p>\n\n\n<div id=\"ta-campaign-widget-66d701e20237f-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d701e20237f\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d701e20237f\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d701e20237f\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d701e20237f\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d701e20237f\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d701e20237f\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Symantec researchers are warning that a BlackByte ransomware affiliate has begun using a custom data exfiltration tool, Infostealer.Exbyte, to steal data from victims&#8217; networks as part of their attacks. Still, as a recent breach of an Indian power company by a different ransomware group demonstrates, the extra effort of stealing data doesn&#8217;t always pay off [&hellip;]<\/p>\n","protected":false},"author":166,"featured_media":19501,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[15],"tags":[2369,3790,31975,31974,3414,2478,730,5277],"b2b_audience":[33,35],"b2b_industry":[],"b2b_product":[31788,394,383,378,395,31790,392],"class_list":["post-25639","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-threats","tag-cloud-security","tag-cybersecurity","tag-data-theft-2","tag-exfiltration","tag-network-security","tag-ransomware","tag-security","tag-web-security","b2b_audience-awareness-and-consideration","b2b_audience-implementation-and-support","b2b_product-advanced-persistent-threats","b2b_product-email-security","b2b_product-encryption-data-loss-prevention","b2b_product-endpoint-security","b2b_product-firewalls-and-intrusion-prevention-and-detection","b2b_product-ransomware","b2b_product-web-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Data Exfiltration: Symantec Warns of Exbyte Threat as Hive Group Leaks Tata Data | eSecurity Planet<\/title>\n<meta name=\"description\" content=\"Could data exfiltration eventually replace ransomware? Recent developments suggest that ransom tactics may change.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/threats\/data-exfiltration-blackbyte-exbyte-hive-group\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Data Exfiltration: Symantec Warns of Exbyte Threat as Hive Group Leaks Tata Data | eSecurity Planet\" \/>\n<meta property=\"og:description\" content=\"Could data exfiltration eventually replace ransomware? Recent developments suggest that ransom tactics may change.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/threats\/data-exfiltration-blackbyte-exbyte-hive-group\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2022-10-26T00:46:30+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-10-26T20:16:21+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/10\/ransomwared.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"269\" \/>\n\t<meta property=\"og:image:height\" content=\"187\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Jeff Goldman\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jeff Goldman\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/data-exfiltration-blackbyte-exbyte-hive-group\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/data-exfiltration-blackbyte-exbyte-hive-group\/\"},\"author\":{\"name\":\"Jeff Goldman\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/814377f0182cc43200a4581fba4ec795\"},\"headline\":\"Data Exfiltration: Symantec Warns of Exbyte Threat as Hive Group Leaks Tata Data\",\"datePublished\":\"2022-10-26T00:46:30+00:00\",\"dateModified\":\"2022-10-26T20:16:21+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/data-exfiltration-blackbyte-exbyte-hive-group\/\"},\"wordCount\":772,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/data-exfiltration-blackbyte-exbyte-hive-group\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/10\/ransomwared.jpg\",\"keywords\":[\"cloud security\",\"cybersecurity\",\"data theft\",\"exfiltration\",\"network security\",\"ransomware\",\"security\",\"Web security\"],\"articleSection\":[\"Threats\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/data-exfiltration-blackbyte-exbyte-hive-group\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/threats\/data-exfiltration-blackbyte-exbyte-hive-group\/\",\"name\":\"Data Exfiltration: Symantec Warns of Exbyte Threat as Hive Group Leaks Tata Data | eSecurity Planet\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/data-exfiltration-blackbyte-exbyte-hive-group\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/data-exfiltration-blackbyte-exbyte-hive-group\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/10\/ransomwared.jpg\",\"datePublished\":\"2022-10-26T00:46:30+00:00\",\"dateModified\":\"2022-10-26T20:16:21+00:00\",\"description\":\"Could data exfiltration eventually replace ransomware? Recent developments suggest that ransom tactics may change.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/data-exfiltration-blackbyte-exbyte-hive-group\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/threats\/data-exfiltration-blackbyte-exbyte-hive-group\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/data-exfiltration-blackbyte-exbyte-hive-group\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/10\/ransomwared.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/10\/ransomwared.jpg\",\"width\":269,\"height\":187,\"caption\":\"ransomware victim\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/data-exfiltration-blackbyte-exbyte-hive-group\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Data Exfiltration: Symantec Warns of Exbyte Threat as Hive Group Leaks Tata Data\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/814377f0182cc43200a4581fba4ec795\",\"name\":\"Jeff Goldman\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/jeff-goldman-150x150.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/jeff-goldman-150x150.jpg\",\"caption\":\"Jeff Goldman\"},\"description\":\"eSecurity Planet contributor Jeff Goldman has been a technology journalist for more than 20 years and an eSecurity Planet contributor since 2009. He's also written extensively about wireless and broadband infrastructure and semiconductor engineering. He started his career at MTV, but soon decided that technology writing was a more promising path.\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/jeff-goldman\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Data Exfiltration: Symantec Warns of Exbyte Threat as Hive Group Leaks Tata Data | eSecurity Planet","description":"Could data exfiltration eventually replace ransomware? Recent developments suggest that ransom tactics may change.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/threats\/data-exfiltration-blackbyte-exbyte-hive-group\/","og_locale":"en_US","og_type":"article","og_title":"Data Exfiltration: Symantec Warns of Exbyte Threat as Hive Group Leaks Tata Data | eSecurity Planet","og_description":"Could data exfiltration eventually replace ransomware? Recent developments suggest that ransom tactics may change.","og_url":"https:\/\/www.esecurityplanet.com\/threats\/data-exfiltration-blackbyte-exbyte-hive-group\/","og_site_name":"eSecurity Planet","article_published_time":"2022-10-26T00:46:30+00:00","article_modified_time":"2022-10-26T20:16:21+00:00","og_image":[{"width":269,"height":187,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/10\/ransomwared.jpg","type":"image\/jpeg"}],"author":"Jeff Goldman","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Jeff Goldman","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/threats\/data-exfiltration-blackbyte-exbyte-hive-group\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/data-exfiltration-blackbyte-exbyte-hive-group\/"},"author":{"name":"Jeff Goldman","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/814377f0182cc43200a4581fba4ec795"},"headline":"Data Exfiltration: Symantec Warns of Exbyte Threat as Hive Group Leaks Tata Data","datePublished":"2022-10-26T00:46:30+00:00","dateModified":"2022-10-26T20:16:21+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/data-exfiltration-blackbyte-exbyte-hive-group\/"},"wordCount":772,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/data-exfiltration-blackbyte-exbyte-hive-group\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/10\/ransomwared.jpg","keywords":["cloud security","cybersecurity","data theft","exfiltration","network security","ransomware","security","Web security"],"articleSection":["Threats"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/threats\/data-exfiltration-blackbyte-exbyte-hive-group\/","url":"https:\/\/www.esecurityplanet.com\/threats\/data-exfiltration-blackbyte-exbyte-hive-group\/","name":"Data Exfiltration: Symantec Warns of Exbyte Threat as Hive Group Leaks Tata Data | eSecurity Planet","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/data-exfiltration-blackbyte-exbyte-hive-group\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/data-exfiltration-blackbyte-exbyte-hive-group\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/10\/ransomwared.jpg","datePublished":"2022-10-26T00:46:30+00:00","dateModified":"2022-10-26T20:16:21+00:00","description":"Could data exfiltration eventually replace ransomware? Recent developments suggest that ransom tactics may change.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/data-exfiltration-blackbyte-exbyte-hive-group\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/threats\/data-exfiltration-blackbyte-exbyte-hive-group\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/threats\/data-exfiltration-blackbyte-exbyte-hive-group\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/10\/ransomwared.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/10\/ransomwared.jpg","width":269,"height":187,"caption":"ransomware victim"},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/threats\/data-exfiltration-blackbyte-exbyte-hive-group\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"Data Exfiltration: Symantec Warns of Exbyte Threat as Hive Group Leaks Tata Data"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/814377f0182cc43200a4581fba4ec795","name":"Jeff Goldman","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/jeff-goldman-150x150.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/jeff-goldman-150x150.jpg","caption":"Jeff Goldman"},"description":"eSecurity Planet contributor Jeff Goldman has been a technology journalist for more than 20 years and an eSecurity Planet contributor since 2009. He's also written extensively about wireless and broadband infrastructure and semiconductor engineering. He started his career at MTV, but soon decided that technology writing was a more promising path.","url":"https:\/\/www.esecurityplanet.com\/author\/jeff-goldman\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/25639"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/166"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=25639"}],"version-history":[{"count":0,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/25639\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/19501"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=25639"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=25639"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=25639"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=25639"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=25639"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=25639"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}