WaterISAC Navigation
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
Home Community Partnerships Ransomware Awareness – HelloKitty Ransomware Poised for Future Adaptations and Attacks
Become a Member

Log in

  • Upcoming Events
  • Resource Center
  • Tools
  • Webcasts
  • Contaminant Databases
  • Directory
  • About
  • Log in

  • My Account

  • Logout

  • Report Incident
  • Contact Us
  • NRWA Signup
  • WaterISAC Champions
More Resources

Ransomware Awareness – HelloKitty Ransomware Poised for Future Adaptations and Attacks

Author: ian_41208

Created: Tuesday, October 10, 2023 - 18:41

Categories: Cybersecurity

HelloKitty is a ransomware group operated with a great deal of human interaction which has been active since November 2020. The groups’ notoriety comes from infiltrating corporate networks, stealing data, and encrypting systems to demand ransoms to include double extortion. One of their most significant attacks was on CD Projekt Red in February 2021, where they claimed to have stolen source code for games like Cyberpunk 2077 and Witcher 3. In the summer of 2021, they expanded their targets to include the VMware ESXi virtual machine platform using a Linux variant. They’ve also operated under various aliases, such as DeathRansom, Fivehands, and possibly Abyss Locker.

Recently, the HelloKitty source code was discovered on a Russian-speaking hacking forum, leaked by an individual using the alias ‘kapuchno,’ who is believed to be the ransomware’s developer. This leaked archive contains tools to build the HelloKitty encryptor and decryptor and the NTRUEncrypt library used for file encryption.

While revealing ransomware source code can benefit cybersecurity research, it also has downsides. Similar cases, like the release of HiddenTear for “educational purposes” and the Babuk ransomware source code, led to threat actors quickly using the code for their attacks. Surprisingly, even today, more than nine ransomware operations use the Babuk source code as the basis for their encryption software.

Maintaining awareness about threat actors’ adaptability through code modification in ransomware campaigns is a crucial part of a comprehensive cybersecurity strategy. Members are encouraged to remain vigilant, implement effective security measures, and actively defend against evolving threats, ultimately enhancing overall cybersecurity defenses. For more, check out BleepingComputer.

Related Resources

Members Only

(TLP:AMBER+STRICT) Situation Report: Heightened Threat Environment – Potential Retaliation by Iranian Threat Actors Following U.S. Strikes on Iran (Updated May 1, 2026)

May 1, 2026 in Cybersecurity, OT-ICS Security, Physical Security, Security Preparedness

Tip of the Week – April 30, 2026

Apr 30, 2026 in Cybersecurity, Security Preparedness

(TLP:CLEAR) Cyber Readiness Institute Joins WaterISAC as a Community Partner to Strengthen Cyber Readiness Across the Water Sector

Apr 30, 2026 in Cybersecurity, Security Preparedness

Become a Member
FAQs
About
Report Incident

Terms & Conditions
Privacy Policy
AI Policy
Contact Us

LinkedIn

1250 I Street NW, Suite 350
Washington, DC 20005
1-866-H2O-ISAC (1-866-426-4722)
© 2026 WaterISAC. All Rights Reserved.

Toggle the Widgetbar