• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
kaseya attack fallout: cisa, fbi offer guidance

Conti Ransomware Attack Spurs State of Emergency in Costa Rica

You are here: Home / Latest Cyber Security Vulnerabilities / Conti Ransomware Attack Spurs State of Emergency in Costa Rica
May 10, 2022

The danger group has leaked info that it promises was stolen in the breach and is promising much more authorities-targeted attacks.

Costa Rican President Rodrigo Chaves declared a condition of countrywide cybersecurity crisis above the weekend pursuing a economically motivated Conti ransomware attack against his administration that has hamstrung the authorities and economic system of the Latin American country.

The attack—attributed to the prolific Conti ransomware group–occurred three months back not prolonged following Chaves took office in actuality, the condition of unexpected emergency was 1 of his first decrees as president. The to start with federal government agency attacked was the Ministry of Finance, which has been without having digital products and services since April 18, according to a printed report.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


Other Costa Rican companies affected contain the Ministry of Labor and Social Security the Ministry of Science, Innovation, Technology and Telecommunications the National Meteorological Institute, between other folks. At this time, the whole scope of the harm is not recognized.
Conti reportedly demanded a ransom of $10 million from Costa Rica’s federal government in trade for not releasing stolen data from the Ministry of Finance, according to a printed report. Costa Rica so considerably has declined to shell out, which resulted in Conti updating its details-leak web-site on Monday with 97 percent of the 672 GB of facts that the group promises incorporates info stolen from Costa Rican federal government businesses, BleepingComputer  reported.

Conti—a top-tier Russian-speaking ransomware group–is acknowledged as a person of the most ruthless gangs in the sport, with a choose-no-prisoners solution specializing in double extortion, a process in which attackers threaten to expose stolen knowledge or use it for potential attacks if victims do not fork out by a deadline.

Conti acts on a ransomware-as-a-assistance (RaaS) model, with a wide network of affiliates and accessibility brokers at its disposal to do its soiled do the job. The group also is regarded for concentrating on corporations for which attacks could have everyday living-threatening outcomes, these kinds of as hospitals, crisis amount dispatch carriers, emergency healthcare services and law-enforcement organizations.

The attack on Costa Rica could be a signal of far more Conti exercise to appear, as the team posted a concept on their information web page to the Costa Rican federal government that the attack is simply a “demo model.” The team also stated the attack was solely motivated by monetary acquire as properly as expressed standard political disgust, yet another sign of far more federal government-directed attacks.

Subsequent-Degree Incident

The incident demonstrates how a cyber-attack can likely be as major as a army action or a natural catastrophe particularly when it has an effect on a building nation like Costa Rica, a security expert observed.

“Costa Rica’s state-of-crisis pursuing an attack from Conti is an important rallying contact to the relaxation of the globe,” Silas Cutler, principal reverse engineer for security agency Stairwell, wrote in an e-mail to Threatpost. “While the unexpected emergency standing might have a minimal immediate effect … it places the severity of this breach into the identical category as a all-natural disaster or military incident.”

The double-extortion part of not only Conti’s but also a number of other ransomware group’s methods also can embolden much more ransomware attacks for the reason that most targeted companies will fork out instead than risk the leak of delicate data—providing more incentive to danger actors, observed an additional security skilled.

“It is a large rationale why most victims are shelling out these days,” observed Roger Grimes, facts-pushed protection evangelist for security firm KnowBe4, in an email to Threatpost.

Conti most likely has every employee’s particular login qualifications to any Costa Rican govt internet site that they frequented throughout the time the ransomware was lively on the process in advance of it locked files, which poses a large challenge for citizens making use of governing administration solutions on the net if Conti certainly has leaked the information, he said.

“If Costa Rica was hosting consumer-dealing with websites in the compromised domains, like they likely have been, their customers’ credentials–which are generally reused on other websites and companies the clients visit–are probable compromised, far too,” Grimes stated. “Not having to pay the ransom places not only Costa Rica’s have expert services at risk, but all those of their workers and consumers.”

In fact, very last year the city of Tulsa, Ok, place its citizens on alert for probable cyber fraud just after Conti leaked some 18,000 metropolis information, typically police citations, on the dark web adhering to a ransomware attack on the city’s authorities.

U.S. Presenting Aid

To enable prevent future attacks like the a person on Costa Rica, the U.S. government stated very last week that it is supplying a significant reward–up to $10 million–for information foremost to the identification and/or locale of any of Conti Group’s leaders. The U.S. also will supply up to $5 million for facts that can guide to the arrest or conviction of anyone conspiring in a Conti ransomware attack.

To day, Conti has been dependable for hundreds of ransomware incidents over the past two several years, with more than 1,000 victims shelling out extra than $150 million to the group, according to the FBI. This presents Conti the dubious honor of currently being the costliest ransomware strain at any time documented, according to the feds.

Whilst authorities pursue Conti, governments can get a selection of measures to reduce ransomware attacks, security pros pointed out. One is to undertake a cultural alter when it comes to cybersecurity, observed Chris Clements, vice president of options architecture at security agency Cerberus Sentinel.

Governments ought to change their concentration from the historic mentality of cyber-security as an “IT charge center” toward a single that sights it as “a culturally ingrained strategy that identifies cybersecurity financial commitment, the two in applications and people, as a critical strategic defensive shield,’ he mentioned in an email to Threatpost.

“Until this variations, the issue of cyber-attack is likely to get worse just before it will get any much better,” Clements claimed in an email to Threatpost.

Governments also can just take proactive actions these as conducting perimeter reviews as a suggests of mitigating some of the strategies Conti-affiliated accessibility brokers use to infiltrate devices, Cutler prompt. This can improved secure their perimeters and let them to respond speedier to attacks.

Having said that, even this “will not completely prevent these styles of attacks” specified the network of affiliates and entry brokers that RaaS groups like Conti have at its disposal to breach techniques, he claimed.


Some areas of this post are sourced from:
threatpost.com

Previous Post: «costa rica declares state of emergency following conti ransomware attack Costa Rica declares state of emergency following Conti ransomware attack
Next Post: #CYBERUK22: Jeremy Fleming Argues Offensive Capabilities Required to Be Global Cyber Power Cyber Security News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • CISA Unveils Ransomware Notification Initiative
  • WooCommerce Patches Critical Plugin Flaw Affecting Half a Million Sites
  • GitHub Updates Security Protocol For Operations Over SSH
  • Malicious Python Package Uses Unicode Trickery to Evade Detection and Steal Data
  • Some GitHub users must take action after RSA SSH host key exposed
  • THN Webinar: Inside the High Risk of 3rd-Party SaaS Apps
  • Pension Protection Fund confirms employee data exposed in GoAnywhere breach
  • GitHub Swiftly Replaces Exposed RSA SSH Key to Protect Git Operations
  • Now UK Parliament Bans TikTok from its Network and Devices
  • IRS Phishing Emails Used to Distribute Emotet

Copyright © TheCyberSecurity.News, All Rights Reserved.