• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

Conti Encrypts Karma Ransom Note in Same Victim Network

You are here: Home / General Cyber Security News / Conti Encrypts Karma Ransom Note in Same Victim Network
March 1, 2022

Security researchers have unveiled how two ransomware teams clashed inside the identical victim firm, with 1 encrypting the other’s ransom take note.

The unnamed Canadian health care firm (HCO) was struck by both equally Conti and Karma ransomware. Nevertheless, although the latter stole data but did not encrypt because of to the victim’s position as a health care company, the former experienced no this kind of qualms, according to Sophos senior threat researcher, Sean Gallagher.

“To be hit by a twin ransomware attack is a nightmare circumstance for any group. Throughout the estimated timeline there was a period of time of all over four times when the Conti and Karma attackers have been simultaneously energetic in the target’s network, going about every other, downloading and jogging scripts, installing Cobalt Strike beacons, collecting and exfiltrating knowledge, and more,” he defined.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


“Karma deployed the last phase of its attack initially, dropping an extortion detect on desktops demanding a Bitcoin payment in trade for not publishing stolen data. Then Conti struck, encrypting the target’s knowledge in a more common ransomware attack. In a odd twist, the Conti ransomware encrypted Karma’s extortion notes.”

Karma’s attack began in August when a very likely first access broker uncovered an unpatched Microsoft Trade server they compromised by means of a ProxyShell exploit. Nearly four months then passed prior to the Karma group picked up the direct, reconnecting with an admin account from a compromised workstation more than RDP.

They dropped Cobalt Strike beacons with a PowerShell script on multiple servers, collected details and employed a compromised server to add the files to a Mega account, Gallagher explained.

The HCO identified as Sophos to support with the attack at the time the ransom be aware landed on December 3, but just a day afterwards, Conti struck, deploying ransomware to encrypt its servers.

The team managed to get an first foothold by exploiting ProxyShell on the very same exposed server prior to dropping a web shell, downloading Cobalt Strike beacons, using PowerShell for lateral movement and then exfiltrating details.

“These dual ransom attacks highlight the risks linked with very well-recognised internet-struggling with computer software vulnerabilities – at the very least, ones that are properly-identified to malicious actors but may not be to the organizations functioning the impacted program,” Gallagher concluded.

“All dimensions of organizations can slide behind on vulnerability management – which is why getting various levels of protection against malicious exercise is vital. Malware protection on servers as well as clients can impede ransomware operators from working with unprotected servers to start their attacks.”


Some parts of this posting are sourced from:
www.infosecurity-journal.com

Previous Post: «Cyber Security News Toyota Halts Production Across Japan After Ransomware Attack
Next Post: China’s “most advanced” malware uncovered after nine years in operation china's "most advanced" malware uncovered after nine years in operation»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.