• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

Conti Encrypts Karma Ransom Note in Same Victim Network

You are here: Home / General Cyber Security News / Conti Encrypts Karma Ransom Note in Same Victim Network
March 1, 2022

Security researchers have unveiled how two ransomware teams clashed inside the identical victim firm, with 1 encrypting the other’s ransom take note.

The unnamed Canadian health care firm (HCO) was struck by both equally Conti and Karma ransomware. Nevertheless, although the latter stole data but did not encrypt because of to the victim’s position as a health care company, the former experienced no this kind of qualms, according to Sophos senior threat researcher, Sean Gallagher.

“To be hit by a twin ransomware attack is a nightmare circumstance for any group. Throughout the estimated timeline there was a period of time of all over four times when the Conti and Karma attackers have been simultaneously energetic in the target’s network, going about every other, downloading and jogging scripts, installing Cobalt Strike beacons, collecting and exfiltrating knowledge, and more,” he defined.

✔ Approved Seller From Our Partners
Malwarebytes Premium 2022

Protect yourself against all threads using Malwarebytes. Get Malwarebytes Premium with 60% discount from a Malwarebytes official seller SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


“Karma deployed the last phase of its attack initially, dropping an extortion detect on desktops demanding a Bitcoin payment in trade for not publishing stolen data. Then Conti struck, encrypting the target’s knowledge in a more common ransomware attack. In a odd twist, the Conti ransomware encrypted Karma’s extortion notes.”

Karma’s attack began in August when a very likely first access broker uncovered an unpatched Microsoft Trade server they compromised by means of a ProxyShell exploit. Nearly four months then passed prior to the Karma group picked up the direct, reconnecting with an admin account from a compromised workstation more than RDP.

They dropped Cobalt Strike beacons with a PowerShell script on multiple servers, collected details and employed a compromised server to add the files to a Mega account, Gallagher explained.

The HCO identified as Sophos to support with the attack at the time the ransom be aware landed on December 3, but just a day afterwards, Conti struck, deploying ransomware to encrypt its servers.

The team managed to get an first foothold by exploiting ProxyShell on the very same exposed server prior to dropping a web shell, downloading Cobalt Strike beacons, using PowerShell for lateral movement and then exfiltrating details.

“These dual ransom attacks highlight the risks linked with very well-recognised internet-struggling with computer software vulnerabilities – at the very least, ones that are properly-identified to malicious actors but may not be to the organizations functioning the impacted program,” Gallagher concluded.

“All dimensions of organizations can slide behind on vulnerability management – which is why getting various levels of protection against malicious exercise is vital. Malware protection on servers as well as clients can impede ransomware operators from working with unprotected servers to start their attacks.”


Some parts of this posting are sourced from:
www.infosecurity-journal.com

Previous Post: «Cyber Security News Toyota Halts Production Across Japan After Ransomware Attack
Next Post: China’s “most advanced” malware uncovered after nine years in operation china's "most advanced" malware uncovered after nine years in operation»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Sioux Falls Funds DSU Cybersecurity Lab
  • ‘CryptoRom’ Crypto-Scam is Back via Side-Loaded Apps
  • Irish Watchdog Fines Meta $19m Over Data Breach
  • Avast Merger Raises Competition Concerns
  • Linux botnet spreads using Log4Shell flaw
  • Another Destructive Wiper Targets Organizations in Ukraine
  • New “B1txor20” Linux Botnet Uses DNS Tunnel and Exploits Log4J Flaw
  • New Infinite Loop Bug in OpenSSL Could Let Attackers Crash Remote Servers
  • FBI, CISA Warn of Russian Hackers Exploiting MFA and PrintNightmare Bug
  • Unpatched RCE Bug in dompdf Project Affects HTML to PDF Converters

Copyright © TheCyberSecurity.News, All Rights Reserved.