You’ve nearly definitely seen and heard the phrase Conti within the context of cybercrime.

Conti is the title of a well known ransomware gang – extra exactly, what’s generally known as a ransomware-as-a-service (RaaS) gang, the place the ransomware code, and the blackmail calls for, and the receipt of extortion funds from determined victims are dealt with by a core group…

…whereas the assaults themselves are orchestrated by a loosely-knit “group” of associates who’re usually recruited not for his or her malware coding skills, however for his or her phishing, social engineering and community intrusion expertise.

Certainly, we all know precisely the type of “expertise”, if that’s an appropriate phrase to make use of right here, that RaaS operators search for of their associates.

About two years in the past, the REvil ransomware gang put up a cool $1,000,000 as entrance cash in an underground hacker-recruiting discussion board, attempting to entice new associates to affix their cybercriminal capers.

Associates usually appear to earn about 70% of any blackmail cash that’s finally extorted by the gang from any victims they assault, which is a big incentive not solely to go in onerous, however to go in broad and deep as properly, attacking and infecting complete networks in a single go.

The attackers typically additionally select a intentionally troublesome time for the corporate they’re attacking, corresponding to within the early hours of a weekend norning.

The extra utterly a sufferer’s community will get derailed and disrupted, the extra seemingly it’s that they’ll find yourself caught with paying to unlock their treasured knowledge and get the enterprise working once more.

As REvil made clear after they spent that $1 million “advertising finances” on-line, the core RaaS crew was on the lookout for:


   Groups that have already got expertise and expertise in penetration 
   testing, working with msf / cs / koadic, nas / tape, hyper-v 
   and analogues of the listed software program and units.

As you possibly can think about, the REvil gang had a particular curiosity in applied sciences corresponding to NAS (networked connected storage), backup tape and Hyper-V (Microsoft’s virtualisation platform) as a result of disrupting any current backups throughout an assault, and “unlocking” digital servers to allow them to be encrypted together with the whole lot else, makes it more durable than ever for victims to get better on their very own.

In case you undergo a file-scrambling assault solely to find that the criminals trashed or encrypted all of your backups first, then your main path to self-recovery may properly already be destroyed.