{"id":7372,"date":"2022-02-23T10:54:14","date_gmt":"2022-02-23T17:54:14","guid":{"rendered":"https:\/\/webdev.securin.xyz\/?p=7372"},"modified":"2023-04-20T02:10:18","modified_gmt":"2023-04-20T09:10:18","slug":"all-about-conti-ransomware","status":"publish","type":"post","link":"https:\/\/webdev.securin.xyz\/articles\/all-about-conti-ransomware\/","title":{"rendered":"All About Conti Ransomware"},"content":{"rendered":"
Conti has been in the news consistently since August 2021, warranting a joint warning<\/a> from the Cybersecurity Infrastructure Security Agency (CISA), Federal Bureau of Investigation (FBI), and National Security Agency (NSA). The warning alerted organizations of the threat posed by the Conti ransomware group and the vulnerabilities exploited.<\/p>\n A risk-based approach is the requirement of the moment if organizations want to stay ahead of dangerous sophisticated ransomware groups, such as Conti.<\/strong><\/p>\n \u00a0Timeline<\/a>\u00a0| Conti Develops\u00a0Log4J Exploitation Chain<\/a><\/p>\n Conti\u2019s Playbook and Tools<\/a>\u00a0 | Conti Attack Methodology<\/a> |<\/p>\n IOCs and MITRE Map<\/a> | Interesting Trends<\/a> |\u00a0Conti Vulnerabilities<\/a><\/p>\n Conti Shuts Down:<\/strong> According to threat intel analyst, Ido Cohen<\/a>, Conti\u2019s servers were shut down. Conti ransomware shut down its last public-facing infrastructure: a pair of Tor servers used to leak data and negotiate with victims, concluding the last chapter of this notorious cybercrime brand.<\/p>\n Intel Management Engine Attack: <\/strong>The Conti ransomware gang has been working on a series of firmware attack tactics that might allow users to access privileged code on compromised machines, according to Conti’s leaked messages. This includes attacks against embedded microcontrollers, such as the Intel Management Engine (ME), which is a privileged component included in Intel’s CPU chipsets that may totally bypass the operating system.<\/p>\n Rust Developers Targeted: <\/strong>On May 20, 2022, security researchers alerted the public to an attack targeting Rust developers with malware aimed directly at infecting GitLab Continuous Integration pipelines. A campaign dubbed CrateDepression combines typosquatting and impersonating a prominent Rust developer to push a malicious ‘crate’ to a Rust dependency community repository.<\/p>\n Costa Rica Declares National Emergency: <\/strong>Costa Rican President, Rodrigo Chaves, declared a national emergency following cyberattacks from the Conti ransomware group on multiple government bodies. Conti ransomware revealed 672 GB of sensitive data on Costa Rican government entities. In addition, Conti threat actor “UNC1756,” along with their affiliate, has claimed sole responsibility for this cyberattack.<\/p>\n ContiLeaks: <\/strong>A new Twitter account named ContiLeaks posted links to an archive of Conti’s internal chat messages on February 27, shortly after the ransomware group offered support to Russia in its war against Ukraine. The leaked data also included domains used for compromises with BazarBackdoor, which is malware used to access targeted networks. In addition, DHS CISA updated the Conti ransomware advisory with Indicators of Compromise (IoCs) containing over 100 domain names utilized in criminal operations.<\/p>\n The ContiLeaks account revealed over 30 vulnerabilities associated with the Conti ransomware, bringing the total of Conti ransomware-associated CVEs to 44.<\/p>\n Internal chats leaked from the Conti ransomware group revealed the inner workings of the group, including details on 30 vulnerabilities exploited by the group and affiliates and specific insights into its processes after gaining entry, such as how it targets Active Directory.<\/p>\n Securin’s data researchers and security analysts discuss the latest developments, the tools, techniques, and procedures used, as well as the vulnerabilities explored by Conti in 2021-22 in this blog.<\/p>\n Who is Conti?<\/strong><\/p>\n Conti ransomware is a Ransomware-as-a-Service (RaaS) operation believed to be controlled by the Russian cybercrime group, Wizard Spider. The ransomware shares some of its code with the infamous Ryuk ransomware, which went out of the news in July 2020.<\/p>\n Conti\u2019s prolific track record continued into 2022, with four attacks being reported within the first two months of the new year. Let us take a look at the different recent incidents involving the Conti group.<\/p>\nRecent Development<\/h2>\n
<\/a>Conti-nuous Attacks Through January 2022<\/strong><\/h2>\n