One Article Review

Accueil - L'article:
Source Fortinet.webp Fortinet ThreatSignal
Identifiant 6794501
Date de publication 2022-09-08 19:21:11 (vue: 2022-09-09 03:05:42)
Titre New Conti Ransomware Campaign Observed in the Wild
Texte FortiGuard Labs has observed a new wave of ransomware threats belonging to the Conti malware family, active in Mexico. These variants appear to target the latest Linux and ESX systems and enable the attacker to encrypt files on the victim's machine and guest virtual machines. The variants are all dynamically linked 64-bit ELF samples written in C.A similar sample to the ones in this campaign was documented previously by Trellix.Why is this Significant?This is significant because the newly observed campaign was launched by the Conti ransomware group who are known for taking encrypted files and stolen information belonging to countless companies from varying sectors hostage for profits. The group announced it plans to retaliate against western targets after the Russian invasion into Ukraine adding a political motivation on top of financial gain.This new campaign seems to be similar to the previous campaigns however, some of the samples involved have much lower detection rates at the time of this writing.What Does the Malware Do?Conti ransomware variants used in the new campaign performs activities identical to the previous ones; it encrypts files on the compromised machine and adds a ".conti" file extension to them after the threat actor exfiltrates information from victim's network. It will then demand a ransom payment from the victim in order to recover the affected files and to prevent stolen information from being released to the public.It leaves a ransom note that reads:All of your files are currently encrypted by CONTI strain. If you don't know who we are - just "Google it".As you already know, all of your data has been encrypted by our software. It cannot be recovered by any means without contacting our team directly.DONT'T TRY TO RECOVER your data by yourselves. Any attempt to recover your data (including the usage of the additional recovery software) can damage your files. However, if you want to try - we recommend choosing the data of the lowest value.DON'T TRY TO IGNORE us. We've downloaded a pack of your internal data and are ready to publich it on our news website if you do not respond. So it will be better for both sides if you contact us as soon as possible.DON'T TRY TO CONTACT feds or any recovery companies.We have our informants in these as a hostile intent and initiate the publication of whole compromised data immediatly.To prove that we REALLY CAN get your data back - we offer you to decrypt two random files completely free of charge.You can contact our team directly for further instructions through our website :TOR VERSION :(you should download and install TOR browser first https://torproject.org)http://[Removed].onion/-YOU SHOULD BE AWAREWe will speak only with an authorized person. It can be the CEO, top management, etc.In case you are not such a person - DON'T CONTACT USYour decisions and action can result in serious harm to your companyInform your supervisors and stay calmThe malware can also be run on ESX environments and has the ability to shut down and encrypt the associated virtual machines.The malware has a detailed helper dialog. This provides another indication for the fact Conti group consists of many people.What is the Status of Coverage?FortiGuard Labs provides the following AV signatures for the Conti ransomware samples observed in the new campaign:Linux/Filecoder_Conti.083E!tr.ransomLinux/Filecoder_Conti.0B97!tr.ransomLinux/Filecoder_Conti.14E3!tr.ransomLinux/Filecoder_Conti.3233!tr.ransomLinux/Filecoder_Conti.3691!tr.ransomLinux/Filecoder_Conti.3FA2!tr.ransomLinux/Filecoder_Conti.5DE1!tr.ransomLinux/Filecoder_Conti.638B!tr.ransomLinux/Filecoder_Conti.65AB!tr.ransomLinux/Filecoder_Conti.919D!tr.ransomLinux/Filecoder_Conti.BDC5!tr.ransomLinux/Filecoder_Conti.C2F5!tr.ransomLinux/Filecoder_Conti.C3D1!tr.ransomLinux/Filecoder_Babyk.H!trPossibleThreatFortiEDR blocks the Conti samples pre-execution.
Envoyé Oui
Condensat 083e 0b97 14e3 3233 3691 3fa2 5de1 638b 65ab 919d :tor ability action active activities actor adding additional adds affected after against all already also announced another any appear are associated attacker attempt authorized awarewe babyk back bdc5 because been being belonging better bit blocks both browser c2f5 c3d1 calmthe campaign campaign:linux/filecoder campaigns can cannot case ceo charge choosing companies companyinform completely compromised consists contact contacting conti countless coverage currently damage data decisions decrypt demand detailed detection dialog directly documented does don dont down download downloaded dynamically elf enable encrypt encrypted encrypts environments esx etc execution exfiltrates extension fact family feds file files financial first following fortiguard free from further gain get google group guest harm has have helper hostage hostile however http:// https://torproject identical ignore immediatly including indication informants information initiate install instructions intent internal invasion involved just know known labs latest launched leaves linked linux lower lowest machine machines malware management many means mexico motivation much network new newly news not note observed offer ones ones; onion/ only order org pack payment people performs person plans political possible pre prevent previous previously profits prove provides public publication publich random ransom ransomlinux/filecoder ransomware rates reads:all ready really recommend recover recovered recovery released removed respond result retaliate run russian sample samples sectors seems serious should shut sides signatures significant similar software some soon speak status stay stolen strain such supervisors systems taking target targets team them then these threat threats through time top tor trellix trpossiblethreatfortiedr try two ukraine usage used usyour value variants varying version victim virtual want wave website western what who whole why wild will without writing written your yourselves
Tags Ransomware Malware Threat
Stories
Notes
Move


L'article ne semble pas avoir été repris aprés sa publication.


L'article ne semble pas avoir été repris sur un précédent.
My email: