28.7 C
New York
Saturday, May 17, 2025

US gives $15M for information on Conti ransomware

Share To Your Friends

[ad_1]

The united statesDepartment of State set two separate bounties for info on the Conti ransomware organized crime group totaling $15 million.

Any info that helps determine or find the Conti group leaders will probably be awarded as much as $10 million. Moreover, $5 million will probably be awarded for any info that results in the arrest of people conspiring with the Conti group.

The rewards are provided underneath the Division of State’s Transnational Organized Crime Rewards Program (TOCRP) and will be claimed from any nation.

Ransomware assaults

Ransomware is a sort of malware that threatens to delete or publish personal info until a ransom is paid.

Total value received by ransomware attacks between the years 2016-2021 (via Chainalysis)
Complete worth acquired by ransomware assaults between the years 2016-2021 (by way of Chainalysis)

Ransomware assaults peaked in 2020 by reaching $692 million in whole worth, based on Chainalysis. The entire quantity paid in ransom remained over $600 million as of 2021. Nevertheless, the slight decline in confiscated whole worth doesn’t imply that the menace can also be degrading. 

The report states:

“Regardless of these numbers, anecdotal proof, plus the truth that ransomware income within the first half of 2021 exceeded that of the primary half of 2020, suggests to us that 2021 will ultimately be revealed to have been a good larger 12 months for ransomware.”

Top 10 ransomware revenue strains (via Chainalysis)
High 10 ransomware income strains (by way of Chainalysis)

The identical report breaks down the highest 10 ransomware strains by income, the place Conti takes the primary place by extorting at the very least $180 million from its victims in 2021. 

Conti ransomware

It’s estimated that the Conti ransomware group has been energetic for over two years and has round 350 members. It was capable of accumulate over $2.7 billion in ransom since 2020.

In line with info leaked from Conti, the group makes use of proprietary in-house software program that’s a lot sooner than different most ransomware packages. All variations of Microsoft Home windows are vulnerable to their assaults. 

On 21 April 2022, the group attacked the Authorities of Costa Rica and focused at the very least 5 authorities businesses, together with the Ministries of Finance, Science, and Expertise. Conti demanded a $10 million ransom and began leaking sure info for not receiving it. 

Specialists from Cyberint, who analyzed Conti debunked beforehand confiscated in-group messages written in Russian and found that the group adopted a well-managed organizational construction.

Conti's organizational structure (via Cyberint)
Conti’s organizational construction (by way of Cyberint)

The messages additionally confirmed that the group had bodily workplaces in Russia, ran efficiency critiques, and even named an “worker of the month.”

Lotem Finkelstein, the top of menace intelligence at Examine Level Software program Applied sciences, acknowledged:

“Our … assumption is that such an enormous group, with bodily workplaces and large income wouldn’t be capable to act in Russia with out the complete approval, and even some cooperation, with Russian intelligence companies.”



[ad_2]


Share To Your Friends

Related Articles

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest Articles