A considerable chunk of the Conti ransomware gang's internal communications is now available due to a data leak, and may threaten the future of the group.
Conti Ransomware Group Voluntarily Shuttered, but Members Expected to Splinter off To Smaller Groups
Security researcher claims that the Conti ransomware attack on Costa Rica was an intentional smokescreen to cover a reorganization into smaller ransomware groups.
Attack campaigns conducted against Ukrainian government agencies and businesses have been linked to an initial access broker that appears to be staffed with former members of the Conti ransomware gang.
After spending $48 million, Irish government officials say the national healthcare system requires more than $100 million to address the impact of the Conti ransomware attack.
The newly sworn-in President of Costa Rica began his administration by declaring a national emergency due to the extensive damage done by a spate of Conti ransomware attacks.
The threat of a coup from the Conti ransomware gang is almost certainly hollow, but it showcases the boldness with which these groups are operating even after international law enforcement operations took out previous line-crossers.
Panasonic's Canadian operation suffered a targeted cyber attack with the Conti Ransomware gang taking responsibility and claiming to have stolen 2.8 GB of corporate documents.
Conti is able to breeze through ransomware attacks in as little as three days thanks to a polished setup that has been years in the making: custom ransomware and tools, a disciplined working schedule and a business-like structure.
Analysis of leaked chats shows that the Russian Conti ransomware gang had developed proof-of-concept code for stealthy firmware attacks targeting Intel's Management Engine.
The Conti ransomware gang became one of the more prominent in the cyber crime world starting in 2020. It has pledged to respond to any cyber attacks on the Russian government or the country's critical infrastructure.