CISA, FBI, and NSA issue a Conti ransomware advisory
Joint statement with the FBI and the NSA warns of increased attacks from the Conti Ransomware
CISA, the Federal Bureau of Investigation (FBI), and the National Security Agency (NSA) have released a joint Cybersecurity Advisory (CSA) alerting organizations of increased Conti ransomware attacks.
The advisory warned that organizations needed to take supplementary measures to increase their level of security. The three agencies added that the operators behind Conti already conducted over 400 attacks on US and international organizations.
“To secure systems against Conti ransomware, CISA, FBI, and the National Security Agency (NSA) recommend implementing the mitigation measures described in this Advisory, which include requiring multi-factor authentication (MFA), implementing network segmentation, and keeping operating systems and software up to date,” the advisory read.
While Conti is considered a ransomware-as-a-service (RaaS) model, there is variation in its structure that differentiates it from a typical affiliate model. Conti developers likely pay ransomware deployers a wage rather than a percentage of the proceeds from a successful attack, according to CISA.
Rob Joyce, director of cyber security at the NSA, said the cyber criminals now running the Conti ransomware-as-a-service have historically targeted critical infrastructure, such as the Defense Industrial Base (DIB). “The advisory highlights actions organizations can take right now to counter the threat,” he added.
“We highly recommend using the mitigations outlined in this advisory to protect against Conti malware and mitigate your risk against any ransomware attack.”
Challenging the rules of security
Protecting data and simplifying IT management with Chrome OS
Natalie Page, threat intelligence analyst at Talion, told ITPro that increased activity from a big player like Conti undoubtedly raises alarm bells across the threat landscape.
Get the ITPro. daily newsletter
Receive our latest news, industry updates, featured resources and more. Sign up today to receive our FREE report on AI cyber crime & security - newly updated for 2024.
“This is a strain known to actively target organizations within the United States, a country which in 2021 fell victim to some of the largest and most destructive ransomware attacks the community has witnessed thus far,” she said.
“With the disappearance of REvil earlier this year, many affiliates shifted strains, with Conti being one of the popular variants adopted by these criminals, explaining this rapid increase in attack attempts, with the FBI confirming that they have witnessed at least 400 individual attacks against domestic and foreign institutions.”
Robert Golladay, EMEA and APAC director at Illusive, told ITPro that hackers are constantly stepping up their game and improving their tools to increase their success rate.
“And then sharing what works - they effectively operate a "GitHub" for attackers, sharing code once they've been successful with a technique. Once an attacker is in the network, which inevitably will happen, it won’t take them long to move laterally to target "crown jewels". At this point it’s too late for companies to save their valuable data and assets,” he said.
Rene Millman is a freelance writer and broadcaster who covers cybersecurity, AI, IoT, and the cloud. He also works as a contributing analyst at GigaOm and has previously worked as an analyst for Gartner covering the infrastructure market. He has made numerous television appearances to give his views and expertise on technology trends and companies that affect and shape our lives. You can follow Rene Millman on Twitter.