{"id":19316,"date":"2022-06-12T10:45:06","date_gmt":"2022-06-12T18:45:06","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2022\/06\/12\/news-13049\/"},"modified":"2022-06-12T10:45:06","modified_gmt":"2022-06-12T18:45:06","slug":"news-13049","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2022\/06\/12\/news-13049\/","title":{"rendered":"Conti&#8217;s Attack Against Costa Rica Sparks a New Ransomware Era"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/62a3bbfee1a7c9ca5f0da113\/master\/pass\/Conti-Ransomware-Costa-Rica-GettyImages-512138283.jpg\"\/><\/p>\n<p><strong>Credit to Author: Matt Burgess| Date: Sun, 12 Jun 2022 11:00:00 +0000<\/strong><\/p>\n<p class=\"BylineWrapper-iiTsTb hAGfXd byline bylines__byline\" data-testid=\"BylineWrapper\" itemprop=\"author\" itemtype=\"http:\/\/schema.org\/Person\"><span itemprop=\"name\" class=\"BylineNamesWrapper-dbkCxf erRIa-D\"><span data-testid=\"BylineName\" class=\"BylineName-cKXFOb UCAzg byline__name\"><a class=\"BaseWrap-sc-TURhJ BaseText-fFzBQt BaseLink-gZQqBA BylineLink-eZnyPI eTiIvU mEZDb fNdcwQ bKZMMS byline__name-link button\" href=\"\/author\/matt-burgess\">Matt Burgess<\/a><\/span><\/span><\/p>\n<p>To revist this article, visit My Profile, then <a href=\"\/account\/saved\">View saved stories<\/a>.<\/p>\n<p>To revist this article, visit My Profile, then <a href=\"\/account\/saved\">View saved stories<\/a>.<\/p>\n<p><span class=\"lead-in-text-callout\">For the last<\/span> two months, Costa Rica has been under siege. Two major <a href=\"https:\/\/www.wired.com\/tag\/ransomware\/\">ransomware<\/a> attacks have crippled many of the country\u2019s essential services, plunging the government into chaos as it scrambles to respond. Officials say that international trade ground to a halt as the ransomware took hold and more than 30,000 medical appointments have been rescheduled, while tax payments have also been disrupted. Millions have been lost due to the attacks, and staff at affected organizations have turned to pen and paper to get things done.<\/p>\n<p class=\"paywall\">Costa Rica\u2019s government, which changed midway through the attacks after elections earlier this year, has declared a \u201cnational emergency\u201d in response to the ransomware\u2014marking the first time a country has done so in response to a cyberattack. Twenty-seven government bodies were targeted in the first attacks, which ran from mid-April until the start of May, according to new president Rodrigo Chaves. The second attack, at the end of May, has sent Costa Rica\u2019s health care system into a spiral. Chaves has declared \u201cwar\u201d on those responsible.<\/p>\n<p class=\"paywall\">At the heart of the hacking spree is <a href=\"https:\/\/www.wired.com\/story\/conti-leaks-ransomware-work-life\/\">Conti<\/a>, the notorious Russia-linked ransomware gang. Conti claimed responsibility for the first attack against Costa Rica\u2019s government and is believed to have some links to the ransomware-as-a-service operation HIVE, which was responsible for the second attack impacting the health care system. Last year, Conti extorted <a data-offer-url=\"https:\/\/blog.chainalysis.com\/reports\/2022-crypto-crime-report-preview-ransomware\/\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/blog.chainalysis.com\/reports\/2022-crypto-crime-report-preview-ransomware\/&quot;}\" href=\"https:\/\/blog.chainalysis.com\/reports\/2022-crypto-crime-report-preview-ransomware\/\" rel=\"nofollow noopener\" target=\"_blank\">more than $180 million<\/a> from its victims, and it has a history of targeting <a data-offer-url=\"https:\/\/www.zdnet.com\/article\/cost-of-conti-ransomware-attack-on-irish-healthcare-system-may-reach-over-100-million\/\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.zdnet.com\/article\/cost-of-conti-ransomware-attack-on-irish-healthcare-system-may-reach-over-100-million\/&quot;}\" href=\"https:\/\/www.zdnet.com\/article\/cost-of-conti-ransomware-attack-on-irish-healthcare-system-may-reach-over-100-million\/\" rel=\"nofollow noopener\" target=\"_blank\">health care organizations<\/a>. However, in February thousands of the group\u2019s <a href=\"https:\/\/www.wired.com\/story\/conti-leaks-ransomware-work-life\/\">internal messages and files were published online<\/a> after it backed Russia\u2019s war against Ukraine.<\/p>\n<p class=\"paywall\">Even among Conti\u2019s long rap sheet of more than <a data-offer-url=\"https:\/\/www.cisa.gov\/uscert\/ncas\/alerts\/aa21-265a\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.cisa.gov\/uscert\/ncas\/alerts\/aa21-265a&quot;}\" href=\"https:\/\/www.cisa.gov\/uscert\/ncas\/alerts\/aa21-265a\" rel=\"nofollow noopener\" target=\"_blank\">1,000 ransomware attacks<\/a>, those against Costa Rica stand out. They mark one of the first times a ransomware group has explicitly targeted a nation\u2019s government, and during the process Conti uncharacteristically called for the Costa Rican government to be overthrown. \u201cThis is possibly the most significant ransomware to date,\u201d says Emsisoft threat analyst Brett Callow. \u201cI can\u2019t recall another occasion when an entire federal government has been held to ransom like this\u2014it\u2019s a first; it\u2019s quite unprecedented.\u201d<\/p>\n<p class=\"paywall\">What\u2019s more, researchers suggest that Conti\u2019s brazen actions may just be callous showboating, enacted to draw attention to the group as it winds down its toxic brand name and its members move on to other ransomware efforts.<\/p>\n<p class=\"paywall\">The first ransomware attack against Costa Rica\u2019s government started during the week of April 10. Throughout the week, Conti probed the systems of the Ministry of Finance, known as Ministerio de Hacienda, explains Jorge Mora, a former director of the Ministry of Science, Innovation, Technology and Telecommunications (MICIT) who helped lead the response to the attacks. By the early hours of April 18, files within the finance ministry had been encrypted and two key systems had been crippled: the digital tax service and the IT system for customs control.<\/p>\n<p class=\"paywall\">\u201cThey affect all the export\/import services in the country of the products,\u201d says Mora, who left the government on May 7 ahead of the administration change. Mario Robles, the CEO and founder of Costa Rican cybersecurity company White Jaguars, estimates that \u201cseveral terabytes\u201d of data and more than 800 servers at the finance ministry have been impacted. Robles says his company has been involved in the response to the attacks but says he cannot name who it has worked with. (The finance ministry did not respond to WIRED\u2019s request for comment.)<\/p>\n<p class=\"paywall\">\u201cThe private sector was very affected,\u201d Mora says. Local reports say import and export businesses faced <a data-offer-url=\"https:\/\/www.teletica.com\/nacional\/rezago-de-importaciones-y-riesgo-de-escasez-de-contenedores-por-hackeo-preocupa-a-cadexco_310194\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.teletica.com\/nacional\/rezago-de-importaciones-y-riesgo-de-escasez-de-contenedores-por-hackeo-preocupa-a-cadexco_310194&quot;}\" href=\"https:\/\/www.teletica.com\/nacional\/rezago-de-importaciones-y-riesgo-de-escasez-de-contenedores-por-hackeo-preocupa-a-cadexco_310194\" rel=\"nofollow noopener\" target=\"_blank\">shipping container shortages<\/a> and estimated losses range from <a data-offer-url=\"https:\/\/www.larepublica.net\/noticia\/38-millones-en-perdidas-al-dia-generan-hackers-al-sector-exportador\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.larepublica.net\/noticia\/38-millones-en-perdidas-al-dia-generan-hackers-al-sector-exportador&quot;}\" href=\"https:\/\/www.larepublica.net\/noticia\/38-millones-en-perdidas-al-dia-generan-hackers-al-sector-exportador\" rel=\"nofollow noopener\" target=\"_blank\">$38 million per day<\/a> up to <a data-offer-url=\"https:\/\/www.larepublica.net\/noticia\/costa-rica-reporta-perdidas-por-125-millones-por-caos-en-aduanas\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.larepublica.net\/noticia\/costa-rica-reporta-perdidas-por-125-millones-por-caos-en-aduanas&quot;}\" href=\"https:\/\/www.larepublica.net\/noticia\/costa-rica-reporta-perdidas-por-125-millones-por-caos-en-aduanas\" rel=\"nofollow noopener\" target=\"_blank\">$125 million over 48 hours.<\/a> \u201cThe disruption paralyzed the imports and exports of the country, making a big impact on the commerce,\u201d says Joey Milgram, a country manager for Costa Rica at cybersecurity company Soluciones Seguras. \u201cThey implemented, after 10 days, a manual form to import, but it was taking much paperwork and many days to process,\u201d Milgram adds.<\/p>\n<p class=\"paywall\">But the attack against the finance ministry was just the beginning. A timeline shared by Mora claims Conti attempted to breach different government organizations almost every day between April 18 and May 2. Local authorities, such as the Municipality of Buenos Aires, were targeted, as well as central government organizations, including the <a data-offer-url=\"https:\/\/www.mtss.go.cr\/prensa\/comunicados\/2022\/mayo\/cp_12_2022.html\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.mtss.go.cr\/prensa\/comunicados\/2022\/mayo\/cp_12_2022.html&quot;}\" href=\"https:\/\/www.mtss.go.cr\/prensa\/comunicados\/2022\/mayo\/cp_12_2022.html\" rel=\"nofollow noopener\" target=\"_blank\">Ministry of Labor and Social Security<\/a>. In some cases, Conti was successful; in others, it failed. Mora says the US, Spain, and private companies helped defend against Conti attacks, providing software and indicators of compromises related to the group. \u201cThat blocked Conti a lot,\u201d he says. (In early May, the US posted a <a data-offer-url=\"https:\/\/www.state.gov\/reward-offers-for-information-to-bring-conti-ransomware-variant-co-conspirators-to-justice\/\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.state.gov\/reward-offers-for-information-to-bring-conti-ransomware-variant-co-conspirators-to-justice\/&quot;}\" href=\"https:\/\/www.state.gov\/reward-offers-for-information-to-bring-conti-ransomware-variant-co-conspirators-to-justice\/\" rel=\"nofollow noopener\" target=\"_blank\">$10 million<\/a> reward for information about Conti\u2019s leadership.)<\/p>\n<p class=\"paywall\">On May 8, Chaves started his four-year term as president and immediately declared a \u201cnational emergency\u201d due to the ransomware attacks, calling the attackers \u201ccyberterrorists.\u201d Nine of the 27 targeted bodies were \u201cvery affected,\u201d Chaves said on May 16. The MICIT, which is overseeing the response to the attacks, did not respond to questions about the progress of the recovery, despite originally offering to set up an interview.<\/p>\n<p class=\"paywall\">\u201cAll the national institutions, they don\u2019t have enough resources,\u201d Robles says. During the recovery, he says, he has seen organizations running on legacy software, making it much harder to enable the services they provide. Some bodies, Robles says, \u201cdon\u2019t even have a person working on cybersecurity.\u201d Mora adds that the attacks show Latin American countries need to improve their cybersecurity resilience, introduce laws to make cyberattack reporting mandatory, and allocate more resources to protect public institutions.<\/p>\n<p class=\"paywall\">But just as Costa Rica started getting a grip on the Conti attacks, another hammer blow struck. On May 31, the second attack started. The systems of the Costa Rican Social Security Fund (CCSS), which organizes health care, were taken offline, plunging the country into a new kind of disarray. This time the HIVE ransomware, which <a data-offer-url=\"https:\/\/blog.talosintelligence.com\/2022\/05\/conti-and-hive-ransomware-operations.html\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/blog.talosintelligence.com\/2022\/05\/conti-and-hive-ransomware-operations.html&quot;}\" href=\"https:\/\/blog.talosintelligence.com\/2022\/05\/conti-and-hive-ransomware-operations.html\" rel=\"nofollow noopener\" target=\"_blank\">has some links to Conti<\/a>, <a data-offer-url=\"https:\/\/www.bleepingcomputer.com\/news\/security\/costa-rica-s-public-health-agency-hit-by-hive-ransomware\/\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.bleepingcomputer.com\/news\/security\/costa-rica-s-public-health-agency-hit-by-hive-ransomware\/&quot;}\" href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/costa-rica-s-public-health-agency-hit-by-hive-ransomware\/\" rel=\"nofollow noopener\" target=\"_blank\">was blamed.<\/a><\/p>\n<p class=\"paywall\">The attack had an immediate effect on people\u2019s lives. Health care systems went offline and printers spewed out garbage, as first reported by <a data-offer-url=\"https:\/\/krebsonsecurity.com\/2022\/05\/costa-rica-may-be-pawn-in-conti-ransomware-groups-bid-to-rebrand-evade-sanctions\/\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/krebsonsecurity.com\/2022\/05\/costa-rica-may-be-pawn-in-conti-ransomware-groups-bid-to-rebrand-evade-sanctions\/&quot;}\" href=\"https:\/\/krebsonsecurity.com\/2022\/05\/costa-rica-may-be-pawn-in-conti-ransomware-groups-bid-to-rebrand-evade-sanctions\/\" rel=\"nofollow noopener\" target=\"_blank\">security journalist Brian Krebs<\/a>. Since then patients have complained of delays in getting treatment and the CCSS has warned parents whose children were undergoing surgery that they <a data-offer-url=\"https:\/\/www.facebook.com\/ccssdecostarica\/posts\/5552368771453467\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.facebook.com\/ccssdecostarica\/posts\/5552368771453467&quot;}\" href=\"https:\/\/www.facebook.com\/ccssdecostarica\/posts\/5552368771453467\" rel=\"nofollow noopener\" target=\"_blank\">may have trouble locating their kids<\/a>. The health service has also <a data-offer-url=\"https:\/\/www.facebook.com\/ccssdecostarica\/posts\/5540413185982359\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.facebook.com\/ccssdecostarica\/posts\/5540413185982359&quot;}\" href=\"https:\/\/www.facebook.com\/ccssdecostarica\/posts\/5540413185982359\" rel=\"nofollow noopener\" target=\"_blank\">begun printing discontinued paper forms<\/a>.<\/p>\n<p class=\"paywall\">By June 3, CCSS had <a data-offer-url=\"https:\/\/www.facebook.com\/ccssdecostarica\/posts\/5539968559360155\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.facebook.com\/ccssdecostarica\/posts\/5539968559360155&quot;}\" href=\"https:\/\/www.facebook.com\/ccssdecostarica\/posts\/5539968559360155\" rel=\"nofollow noopener\" target=\"_blank\">declared<\/a> an \u201cinstitutional emergency,\u201d with local reports claiming that <a data-offer-url=\"https:\/\/www.nacion.com\/el-pais\/salud\/hackeo-en-ccss-entidad-procura-asegurar-limpieza\/R43S6MZZAFHSZEN4ZR32WUGYS4\/story\/\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.nacion.com\/el-pais\/salud\/hackeo-en-ccss-entidad-procura-asegurar-limpieza\/R43S6MZZAFHSZEN4ZR32WUGYS4\/story\/&quot;}\" href=\"https:\/\/www.nacion.com\/el-pais\/salud\/hackeo-en-ccss-entidad-procura-asegurar-limpieza\/R43S6MZZAFHSZEN4ZR32WUGYS4\/story\/\" rel=\"nofollow noopener\" target=\"_blank\">759 of the 1,500<\/a> servers and 10,400 computers have been impacted. A spokesperson for CCSS says hospital and emergency services are now running normally and the efforts of its staff have maintained care. However, those seeking medical care have faced significant disruptions: 34,677 appointments have been rescheduled, as of June 6. (The figure is 7 percent of total appointments; the CCSS says 484,215 appointments have gone ahead.) Medical imaging, pharmacies, testing laboratories, and operating theaters are all facing some disruption.<\/p>\n<p class=\"paywall\">There are questions about whether the two separate ransomware attacks against Costa Rica are linked. However, they come as the face of ransomware may be changing. In recent weeks, Russian-linked ransomware gangs have <a data-offer-url=\"https:\/\/www.wsj.com\/articles\/russia-linked-ransomware-groups-are-changing-tactics-to-dodge-crackdowns-11654178400\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.wsj.com\/articles\/russia-linked-ransomware-groups-are-changing-tactics-to-dodge-crackdowns-11654178400&quot;}\" href=\"https:\/\/www.wsj.com\/articles\/russia-linked-ransomware-groups-are-changing-tactics-to-dodge-crackdowns-11654178400\" rel=\"nofollow noopener\" target=\"_blank\">changed their tactics to avoid US sanctions<\/a> and are <a data-offer-url=\"https:\/\/www.vice.com\/en\/article\/7k8z4x\/lockbit-ransomware-group-evil-corp-beef-alert\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.vice.com\/en\/article\/7k8z4x\/lockbit-ransomware-group-evil-corp-beef-alert&quot;}\" href=\"https:\/\/www.vice.com\/en\/article\/7k8z4x\/lockbit-ransomware-group-evil-corp-beef-alert\" rel=\"nofollow noopener\" target=\"_blank\">fighting over their territory more than usual<\/a>.<\/p>\n<p class=\"paywall\">Conti first announced its attack on the finance ministry on its blog, where it publishes the names of its victims and, if they fail to pay its ransom, the files it has stolen from them. A person or group dubbing themselves unc1756\u2014the \u201cUNC\u201d abbreviation is used by some <a data-offer-url=\"https:\/\/www.mandiant.com\/resources\/how-mandiant-tracks-uncategorized-threat-actors\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.mandiant.com\/resources\/how-mandiant-tracks-uncategorized-threat-actors&quot;}\" href=\"https:\/\/www.mandiant.com\/resources\/how-mandiant-tracks-uncategorized-threat-actors\" rel=\"nofollow noopener\" target=\"_blank\">security firms to indicate \u201cuncategorized\u201d attackers<\/a>\u2014used the blog to claim responsibility for the attack. The attacker demanded $10 million as a ransom payment, later upping the figure to $20 million. When no payment was made, they started uploading 672 GB of files to Conti\u2019s website.<\/p>\n<p class=\"paywall\">However, Conti\u2019s behavior was more erratic and disturbing than usual\u2014the attacker moved into politics. \u201cI appeal to every resident of Costa Rica, go to your government and organize rallies,\u201d one post on Conti\u2019s blog <a data-offer-url=\"https:\/\/www.databreaches.net\/conti-abandons-all-pretense-at-professionalism-issues-increasingly-strident-threats-as-costa-rica-struggles\/\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.databreaches.net\/conti-abandons-all-pretense-at-professionalism-issues-increasingly-strident-threats-as-costa-rica-struggles\/&quot;}\" href=\"https:\/\/www.databreaches.net\/conti-abandons-all-pretense-at-professionalism-issues-increasingly-strident-threats-as-costa-rica-struggles\/\" rel=\"nofollow noopener\" target=\"_blank\">said<\/a>. \u201cWe are determined to overthrow the government by means of a cyber attack,\u201d said another post addressed to Costa Rica and \u201cUS terrorists (Biden and his administration).\u201d<\/p>\n<p class=\"paywall\">\u201cI think I never saw cyber criminals using, publicly at least, such rhetoric against any government,\u201d says Sergey Shykevich, Threat Intelligence group manager at security firm Check Point, who also notes that <a data-offer-url=\"https:\/\/blog.checkpoint.com\/2022\/05\/26\/country-extortion-ransomware-expands-business-to-the-governmental-sector\/\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/blog.checkpoint.com\/2022\/05\/26\/country-extortion-ransomware-expands-business-to-the-governmental-sector\/&quot;}\" href=\"https:\/\/blog.checkpoint.com\/2022\/05\/26\/country-extortion-ransomware-expands-business-to-the-governmental-sector\/\" rel=\"nofollow noopener\" target=\"_blank\">Conti targeted Peru\u2019s finance ministry and intelligence agency<\/a> around the same time as the Costa Rica attacks. Shykevich says Conti\u2019s behavior was criticized on Russian-language hacking forums, as getting into politics would draw more attention to cybercrime groups.<\/p>\n<p class=\"paywall\">Some believe Conti\u2019s attack against Costa Rica may have been designed as a distraction. On May 19, US-based cybersecurity firm <a data-offer-url=\"https:\/\/www.advintel.io\/post\/discontinued-the-end-of-conti-s-brand-marks-new-chapter-for-cybercrime-landscape\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.advintel.io\/post\/discontinued-the-end-of-conti-s-brand-marks-new-chapter-for-cybercrime-landscape&quot;}\" href=\"https:\/\/www.advintel.io\/post\/discontinued-the-end-of-conti-s-brand-marks-new-chapter-for-cybercrime-landscape\" rel=\"nofollow noopener\" target=\"_blank\">AdvIntel declared Conti\u2019s operations dead<\/a>, saying the group had started dismantling its brand\u2014but not its overall organizational structure\u2014in early May. Citing visibility inside the gang, AdvIntel said the administration panel of Conti\u2019s news website has been shut down. \u201cThe negotiations service site was also down, while the rest of the infrastructure, from chatrooms to messengers, and from servers to proxy hosts, was going through a massive reset,\u201d AdvIntel said in a <a data-offer-url=\"https:\/\/www.advintel.io\/post\/discontinued-the-end-of-conti-s-brand-marks-new-chapter-for-cybercrime-landscape\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.advintel.io\/post\/discontinued-the-end-of-conti-s-brand-marks-new-chapter-for-cybercrime-landscape&quot;}\" href=\"https:\/\/www.advintel.io\/post\/discontinued-the-end-of-conti-s-brand-marks-new-chapter-for-cybercrime-landscape\" rel=\"nofollow noopener\" target=\"_blank\">briefing<\/a>.<\/p>\n<p class=\"paywall\">Since Conti expressed its support for Vladimir Putin\u2019s war in Ukraine and threatened to hack anyone who targeted Russia, the group has struggled to make money. \u201cIt is now considerably harder for them to extract payments from US victims,\u201d Callow says. \u201cSeveral negotiation firms will no longer transact with them for fear of breaking <a data-offer-url=\"https:\/\/home.treasury.gov\/policy-issues\/office-of-foreign-assets-control-sanctions-programs-and-information\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/home.treasury.gov\/policy-issues\/office-of-foreign-assets-control-sanctions-programs-and-information&quot;}\" href=\"https:\/\/home.treasury.gov\/policy-issues\/office-of-foreign-assets-control-sanctions-programs-and-information\" rel=\"nofollow noopener\" target=\"_blank\">OFAC sanctions<\/a>, and some companies won\u2019t necessarily want to deal with them because they don\u2019t want to be seen to be potentially sponsoring terrorism.\u201d ADVIntel goes further, saying Conti couldn\u2019t \u201csufficiently support and obtain extortion,\u201d prompting the group to lash out.<\/p>\n<p class=\"paywall\">Several weeks later, AdvIntel CEO Vitali Kremez says Conti\u2019s services are still offline. The Costa Rica attack, at least in the eyes of AdVIntel, was meant to give Conti cover while it continued to rebrand itself and start using different types of ransomware. Despite this, Conti\u2019s last reckless public act may leave a legacy. While cybercriminals may not choose to routinely attack national governments, a new precedent has been set. \u201cConti put their stamp on a new era in ransomware,\u201d Check Point\u2019s Shykevich says. \u201cThey proved and showed that a cybercrime group can do country extortion.\u201d<\/p>\n<p><a href=\"https:\/\/www.wired.com\/story\/costa-rica-ransomware-conti\/\" target=\"bwo\" >https:\/\/www.wired.com\/category\/security\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/62a3bbfee1a7c9ca5f0da113\/master\/pass\/Conti-Ransomware-Costa-Rica-GettyImages-512138283.jpg\"\/><\/p>\n<p><strong>Credit to Author: Matt Burgess| Date: Sun, 12 Jun 2022 11:00:00 +0000<\/strong><\/p>\n<p>A pair of ransomware attacks crippled parts of the country\u2014and rewrote the rules of cybercrime.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10607],"tags":[714,21358],"class_list":["post-19316","post","type-post","status-publish","format-standard","hentry","category-security","category-wired","tag-security","tag-security-cyberattacks-and-hacks"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/19316","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=19316"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/19316\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=19316"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=19316"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=19316"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}