CISA, FBI, and NSA issue a Conti ransomware advisory
Joint statement with the FBI and the NSA warns of increased attacks from the Conti Ransomware
CISA, the Federal Bureau of Investigation (FBI), and the National Security Agency (NSA) have released a joint Cybersecurity Advisory (CSA) alerting organizations of increased Conti ransomware attacks.
The advisory warned that organizations needed to take supplementary measures to increase their level of security. The three agencies added that the operators behind Conti already conducted over 400 attacks on US and international organizations.
“To secure systems against Conti ransomware, CISA, FBI, and the National Security Agency (NSA) recommend implementing the mitigation measures described in this Advisory, which include requiring multi-factor authentication (MFA), implementing network segmentation, and keeping operating systems and software up to date,” the advisory read.
While Conti is considered a ransomware-as-a-service (RaaS) model, there is variation in its structure that differentiates it from a typical affiliate model. Conti developers likely pay ransomware deployers a wage rather than a percentage of the proceeds from a successful attack, according to CISA.
Rob Joyce, director of cyber security at the NSA, said the cyber criminals now running the Conti ransomware-as-a-service have historically targeted critical infrastructure, such as the Defense Industrial Base (DIB). “The advisory highlights actions organizations can take right now to counter the threat,” he added.
“We highly recommend using the mitigations outlined in this advisory to protect against Conti malware and mitigate your risk against any ransomware attack.”
Challenging the rules of security
Protecting data and simplifying IT management with Chrome OSFree download
Natalie Page, threat intelligence analyst at Talion, told ITPro that increased activity from a big player like Conti undoubtedly raises alarm bells across the threat landscape.
“This is a strain known to actively target organizations within the United States, a country which in 2021 fell victim to some of the largest and most destructive ransomware attacks the community has witnessed thus far,” she said.
“With the disappearance of REvil earlier this year, many affiliates shifted strains, with Conti being one of the popular variants adopted by these criminals, explaining this rapid increase in attack attempts, with the FBI confirming that they have witnessed at least 400 individual attacks against domestic and foreign institutions.”
Robert Golladay, EMEA and APAC director at Illusive, told ITPro that hackers are constantly stepping up their game and improving their tools to increase their success rate.
“And then sharing what works - they effectively operate a "GitHub" for attackers, sharing code once they've been successful with a technique. Once an attacker is in the network, which inevitably will happen, it won’t take them long to move laterally to target "crown jewels". At this point it’s too late for companies to save their valuable data and assets,” he said.
Activation playbook: Deliver data that powers impactful, game-changing campaigns
Bringing together data and technology to drive better business outcomesFree Download
In unpredictable times, a data strategy is key
Data processes are crucial to guide decisions and drive business growthFree Download
Achieving resiliency with Everything-as-a-Service (XAAS)
Transforming the enterprise IT landscapeFree Download
What is contextual analytics?
Creating more customer value in HR software applicationsFree Download