• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

Conti Group Compromised 40 Firms in Just One Month

You are here: Home / General Cyber Security News / Conti Group Compromised 40 Firms in Just One Month
June 24, 2022

Prolific ransomware team Conti managed to breach 40 victim corporations in a fast-hearth marketing campaign about the system of just a number of months, according to new investigation from Group-IB.

The Singapore-centered threat intelligence firm claimed in a new report that the “ARMattack” operation ran from November 17 to December 20 2021.

On the other hand, it was startlingly effective, with victims largely concentrated in the US (37%), but also Europe, India and the UAE.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


The group’s quickest attack was carried out in particularly three times, from original obtain to information encryption, accelerated by the simple fact that its associates work 14-hour times with out holiday seasons, according to Team-IB.

Conti ongoing its amazing report into 2022, compromising and leaking information on a further 156 firms in just the 1st four months. By Team-IB’s reckoning, it has stolen facts from at the very least 859 businesses above its two-yr existence, despite the fact that the actual whole of victims is believed to be considerably better.

A huge internal data breach earlier this 12 months disclosed the interior workings of the team for the 1st time. It highlighted a demanding operational structure, which includes alphabetized groups that includes developers, pen testers, OSINT experts, admins and QA and reverse engineer gurus.

The group also employed an HR and recruitment direct, a person in cost of its information leak site, a teaching expert and a blockchain lead.

It is thought it expended at minimum $6m each year on salaries, tools and expert services.

Nonetheless, the group appeared to shut down its operations in May, unplugging its IT infrastructure, which include chat servers. The determination might have been taken thanks to the information leak and/or its selection to publicly back again Russia’s war in Ukraine.

Most likely, team customers will reform and rebrand, as most ransomware outfits do.

“Ransomware is no more time a match between ordinary malware builders, but an illicit RaaS sector that offers work opportunities to countless numbers of cyber-criminals all over the world with numerous specializations,” reported Ivan Pisarev, head of the Dynamic Malware Analysis Staff at Team-IB.

“In this sector, Conti is a notorious participant that has in truth made an ‘IT company’ whose objective is to extort significant sums. The team will proceed its operations, either on its have or with the enable of its ‘subsidiary’ projects.”


Some components of this posting are sourced from:
www.infosecurity-magazine.com

Previous Post: «Cyber Security News Unsecured APIs Could Be Costing Firms $75bn Per Year

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Conti Group Compromised 40 Firms in Just One Month
  • Unsecured APIs Could Be Costing Firms $75bn Per Year
  • Euro Police Target Gangs Grooming Ukrainian Refugees Online
  • State-Backed Hackers Using Ransomware as a Decoy for Cyber Espionage Attacks
  • New ‘Quantum’ Builder Lets Attackers Easily Create Malicious Windows Shortcuts
  • Log4Shell Still Being Exploited to Hack VMWare Servers to Exfiltrate Sensitive Data
  • #InfosecurityEurope2022: How Should SMEs Defend Against Cyber-Risks?
  • #InfosecurityEurope2022: Lawyers Update Security for New Ways of Working
  • #InfosecurityEurope2022: Actions Not Words – Hacking the Human Through Social Engineering
  • #InfosecurityEurope2022: Disinformation Warfare – How Do We Tackle Fake News?

Copyright © TheCyberSecurity.News, All Rights Reserved.