Conti (ransomware)

Conti is a is a ransomware that has been observed since 2020, believed to be distributed by a Russia-based group.[1][2] It operates as a ransomware-as-a-service (RaaS), enabling other cybercriminals to deploy this malware for their own purposes. Conti is particularly known for its utilization of double extortion techniques, where it not only encrypts victim's files but also steals and threatens to publish sensitive data if the ransom is not paid.

Conti
Formation2020
TypeHacking

All versions of Microsoft Windows are known to be affected.[1] The United States government offered a reward of up to $10 million for information on the group in early May of 2022.

Description

RaaS model

Conti's ransomware as a service (RaaS) model vary in its structure from a typical affiliate model. Conti developers probably pay the deployers of the ransomware a wage rather than a percentage of the proceeds used by affiliate cyber actors and receives a share of the proceeds from a successful attack.[3]

Tactics and Techniques

Conti ransomware employs various stealthy techniques, including the use of BazarLoader, to infiltrate its target systems. The ransomware is designed to encrypt files and render them inaccessible until a ransom is paid. It is often delivered through phishing emails, exploit kits, or compromised websites. Conti has gained notoriety for targeting healthcare institutions, as seen in its attacks on organizations in Ireland and New Zealand.[4]

The Conti group has also been known to sell access to victim organizations that have refused to pay the ransom. This practice not only adds another layer of pressure on victims but also provides an additional source of revenue for the ransomware gang. These tactics, combined with the group's sophisticated techniques, have made Conti one of the most prolific and capable ransomware groups operating in 2021.[4]

The software uses its own implementation of AES-256 that uses up to 32 individual logical threads, making it much faster than most ransomware.[1] The method of delivery is not clear.[1]

The gang behind Conti has operated a site from which it can leak documents copied by the ransomware since 2020.[5] The same gang has operated the Ryuk ransomware.[5] The group is known as Wizard Spider and is based in Saint Petersburg, Russia.[6]

Once on a system it will try to delete Volume Shadow Copies.[1] It will try to terminate a number of services using Restart Manager to ensure it can encrypt files used by them.[1] It will disable real time monitor and uninstall the Windows Defender application. Default behaviour is to encrypt all files on local and networked Server Message Block drives, ignoring files with DLL, .exe, .sys and .lnk extensions.[1] It is also able to target specific drives as well as individual IP addresses.[1][2]

According to NHS Digital the only guaranteed way to recover is to restore all affected files from their most recent backup.[1]

Membership and structure

The most senior member is known by the aliases Stern or Demon and acts as CEO.[7] Another member known as Mango acts as a general manager and frequently communicates with Stern.[7] Mango told Stern in one message that there were 62 people in the main team.[7] The numbers involved fluctuate, reaching as high as 100.[7] Because of constant turnover in members, the group recruits constantly from legitimate job recruitment sites and hacker sites.[7]

Ordinary programmers earn around $1500 to $2000 per month, and members negotiating ransom payments can take a share of the profits.[7] In April 2021 one member claimed to have an unnamed journalist who took a 5% share of ransomware payments by pressuring victims to pay up.[7]

In May 2022, the United States government offered a reward of up to $15 million for information on the group: $10 million for the identity or location of its leaders, and $5 million for information leading to the arrest of anyone conspiring with it.[8]

Affected Industries and Countries

Conti ransomware attacks have been detected across the globe, with the United States experiencing the highest number of attack attempts from January 1 to November 12, 2021, surpassing one million attempts. The Netherlands and Taiwan were ranked second and third, respectively.[9]

The retail industry has been the primary target of Conti attacks, followed by insurance, manufacturing, and telecommunications sectors. Healthcare, which was targeted in high-profile attacks by the Conti group, ranks sixth on the list of affected industries.[9]

History

Origin

Conti is often considered as the successor to Ryuk ransomware.[10]

Leaks

During the 2022 Russian invasion of Ukraine, Conti Group announced its support of Russia and threatened to deploy "retaliatory measures" if cyberattacks were launched against the country.[11][12][7] As a result, approximately 60,000 messages from internal chat logs were leaked by an anonymous person who indicated their support for Ukraine[13][14][15] along with source code and other files used by the group.[16][7][17]

The leaks cover from the start of 2020 to 27 February 2022, and consists of more than 60,000 chat messages.[7] Most leaked messages were direct messages sent via Jabber.[7] Attacks were coordinated using Rocket.Chat.[7] The leaks are fragmented.[7]

Some of the messages discuss the actions of Cozy Bear in hacking researchers into COVID-19.[18] Kimberly Goody, director of cybercrime analysis at Mandiant says that references to an unnamed external source in the logs that could be helpful to the gang.[18] She points to mention in the leaks of Liteyny Avenue in Saint Petersburg, home to local FSB offices, as evidence that the external source could be the Russian government.[18]

Views expressed in the leaks include support for Vladimir Putin, Vladimir Zhirinovsky and antisemitism, including towards Volodymyr Zelenskyy.[19] A member known as Patrick repeated several false claims made by Putin about Ukraine.[19] Patrick lives in Australia and may be a Russian citizen.[19]

Some messages show an obsession with Brian Krebs.[19]

The messages use mat heavily.[19] Messages containing homophobia, misogyny and references to child abuse were also found.[19]

Dissolution

In the weeks following the leak, the group dissolved.[20] A report from Recorded Future said that they did not think that the leak was not a direct cause of the dissolution, but that it had accelerated already existing tensions within the group.[20]

Known targets

See also

References

  1. "Conti Ransomware". NHS Digital. NHS Digital. 9 July 2020. Retrieved 14 May 2021.
  2. Cimpanu, Catalin (9 July 2020). "Conti ransomware uses 32 simultaneous CPU threads for blazing-fast encryption". ZDNet. Retrieved 14 May 2021.
  3. "Conti Ransomware | CISA". www.cisa.gov. 9 March 2022. Retrieved 9 July 2023.
  4. "Ransomware Spotlight: Conti - Security News". www.trendmicro.com. Retrieved 9 July 2023.
  5. Cimpanu, Catalin (25 August 2020). "Conti (Ryuk) joins the ranks of ransomware gangs operating data leak sites". ZDNet. Retrieved 15 May 2021.
  6. Corfield, Gareth (14 May 2021). "Hospitals cancel outpatient appointments as Irish health service struck by ransomware". The Register. Retrieved 15 May 2021.
  7. Burgess, Matt (16 March 2022). "The Workaday Life of the World's Most Dangerous Ransomware Gang". Wired UK. Retrieved 21 March 2022.
  8. Beech, Eric (7 May 2022). "U.S. offers $15 million reward for information on Conti ransomware group". Reuters.
  9. "Ransomware Spotlight: Conti - Security News". www.trendmicro.com. Retrieved 9 July 2023.
  10. "Ransomware Spotlight: Conti - Security News". www.trendmicro.com. Retrieved 9 July 2023.
  11. Reichert, Corinne (25 February 2022). "Conti Ransomware Group Warns Retaliation if West Launches Cyberattack on Russia". CNET. Retrieved 2 March 2022.
  12. Bing, Christopher (25 February 2022). "Russia-based ransomware group Conti issues warning to Kremlin foes". Reuters. Retrieved 2 March 2022.
  13. Corfield, Gareth (28 February 2022). "60,000 Conti ransomware gang messages leaked". The Register. Retrieved 2 March 2022.
  14. Humphries, Matthew (28 February 2022). "Backing Russia Backfires as Conti Ransomware Gang Internal Chats Leak". PCMag. Retrieved 2 March 2022.
  15. Faife, Corin (28 February 2022). "A ransomware group paid the price for backing Russia". The Verge. Retrieved 2 March 2022.
  16. "The Conti ransomware leaks". Malwarebytes. 1 March 2022. Retrieved 2 March 2022.
  17. 'I can fight with a keyboard': How one Ukrainian IT specialist exposed a notorious Russian ransomware gang CNN. 2022.
  18. Burgess, Matt (18 March 2022). "Leaked Ransomware Docs Show Conti Helping Putin From the Shadows". Wired UK. Retrieved 21 March 2022.
  19. Lee, Micah (14 March 2022). "Leaked Chats Show Russian Ransomware Gang Discussing Putin's Invasion of Ukraine". The Intercept. Retrieved 21 March 2022.
  20. Hardcastle, Jessica Lyons (24 February 2023). "Ukraine invasion blew up Russian cybercrime alliances". The Register. Retrieved 25 February 2023.
  21. "Waikato hospitals hit by cyber security incident". Radio New Zealand. 18 May 2021. Retrieved 18 May 2021.
  22. "Shutterfly services disrupted by Conti ransomware attack". Bleeping Computer. 27 December 2021. Retrieved 27 December 2021.
  23. "KP Snacks giant hit by Conti ransomware". Bleeping Computer. 22 January 2022. Retrieved 22 January 2022.
  24. Stupp, Catherine (12 January 2022). "Inside a Ransomware Hit at Nordic Choice Hotels". Wall Street Journal. ISSN 0099-9660. Retrieved 15 July 2022.
This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.