Introduction: Conti Ransomware, discovered in 2019 by Check Point researchers, stands out for its agility, autonomy, and guided operation, marked by unparalleled encryption speed. Operated mainly through a Ransomware-as-a-Service (RaaS) affiliation model, Conti is linked to the TrickBot gang and is an evolution of the Ryuk codebase, utilizing the same TrickBot infrastructure.
History and Notable Traits: The Conti ransomware has been active since 2019 and has successfully extorted millions from over 400 organizations. It has earned notoriety for its high-level encryption and advanced tactics, including double extortion—encrypting files and threatening to release sensitive data. Developed and maintained by the TrickBot gang, Conti relies on a RaaS model.
Target and Modus Operandi: Conti predominantly targets businesses, government organizations, and educational institutions, with a focus on healthcare, legal, financial, and other high-profile entities. Notably, they avoid entities within the Commonwealth of Independent States (CIS). Conti leverages lateral movement through networks, exploiting vulnerabilities such as the Microsoft Exchange vulnerabilities (CVE-2021-34473, CVE-2021-34523, CVE-2021-31207).
Attack Examples: Conti has targeted a range of organizations globally, causing significant disruptions and financial losses. Examples include the Scottish Environment Protection Agency (SEPA), Fat Face, Health Service Executive (HSE) in Ireland, Waikato District Health Board in New Zealand, KP Snacks, and Nordic Choice Hotels. Notably, Conti orchestrated a massive cyberattack on Costa Rica in April and May 2022, leading to substantial economic losses.
Technical Insights: Conti is an aggressive ransomware family with ties to TrickBot and Ryuk. Boasting stronger encryption and increased speed, it evolved over time with improved obfuscation and encryption methodologies. It utilizes up to 32 simultaneous CPU threads for file encryption, employing the CHACHA algorithm since September 2020 for faster encryption.
Detection Strategies: EDR is effective in identifying and preventing Conti-related malicious activities. For organizations without this platform, a multi-layered approach is recommended:
Mitigation Measures: , the following steps can help mitigate the risk of Conti ransomware attacks:
A comprehensive approach, including employee education, preventive measures, and recovery strategies, is crucial to effectively mitigate the risk of Conti ransomware attacks.
Back