Conti is a ransomware-as-a-service (RaaS) operation known for targeting large, global organizations and government agencies.
Conti started as malware first used by the Russia-based Wizard Spider group in 2019. It’s thought to be the successor of Ryuk ransomware, which targeted more than 100 U.S. and international businesses starting in August 2018. Over time, Conti transitioned to a full-fledged ransomware-as-a-service (RaaS) model used by numerous groups to launch attacks. It’s been used against global enterprises and government agencies, primarily in North America, to steal sensitive files and demand millions of dollars in ransoms from high-revenue organizations. Conti Ransomware Group was ultimately shut down in 2022 after splitting into smaller groups, but its methods persist today.
Source: OCD & MITRE ATT&CK
Conti targeted hundreds of victims from Ireland to Costa Rica. However, its most successful attacks occurred in North America.
Sources: Ransomware.live
Conti Ransomware is primarily used to target corporations and government agencies, particularly those in North America.
Image source: Sophos
Conti Ransomware is primarily used to target corporations and government agencies, particularly those in North America.
Image source: Sophos
To date, 351 victims have fallen prey to Conti Ransomware. Some high-profile victims include Ireland's Health Service Executive (HSE), local government offices, and several private firms. The HSE attack in 2021 caused widespread disruption in healthcare services, illustrating Conti's significant operational impact.
Source: Ransomware.live
Conti uses various techniques such as phishing emails, exploit kits, compromised websites, and stolen remote desktop protocol (RDP) credentials to deliver ransomware. It also uses botnets like BazarLoader and TrickBot to infiltrate target systems.
Using tools like Cobalt Strike, Conti operators exploit vulnerabilities and use techniques like named pipe impersonation (GetSystem) to gain SYSTEM privileges.
Attackers disable Windows Defender via Group Policy changes and employ obfuscation techniques to hide malicious activity.
Conti utilizes tools like Mimikatz and Cobalt Strike to dump credentials and perform Kerberos ticket theft (overpass-the-hash).
Threat actors execute commands using tools like nltest, net.exe, and dsquery to map the network environment.
Lateral movement occurs using SMB, PsExec, and RDP connections, often proxied through the initial foothold.
The malware scans for sensitive files and directories, which are then exfiltrated to the attackers’ servers.
The ransomware is executed in-memory using tools like Cobalt Strike, encrypting files and rendering systems unusable.
Data is exfiltrated using Cobalt Strike’s beaconing capabilities or custom scripts over secure channels.
Conti encrypts critical files and leaves a ransom note, demanding payment to decrypt and avoid public exposure of stolen data.
Conti uses various techniques such as phishing emails, exploit kits, compromised websites, and stolen remote desktop protocol (RDP) credentials to deliver ransomware. It also uses botnets like BazarLoader and TrickBot to infiltrate target systems.
Using tools like Cobalt Strike, Conti operators exploit vulnerabilities and use techniques like named pipe impersonation (GetSystem) to gain SYSTEM privileges.
Attackers disable Windows Defender via Group Policy changes and employ obfuscation techniques to hide malicious activity.
Conti utilizes tools like Mimikatz and Cobalt Strike to dump credentials and perform Kerberos ticket theft (overpass-the-hash).
Threat actors execute commands using tools like nltest, net.exe, and dsquery to map the network environment.
Lateral movement occurs using SMB, PsExec, and RDP connections, often proxied through the initial foothold.
The malware scans for sensitive files and directories, which are then exfiltrated to the attackers’ servers.
The ransomware is executed in-memory using tools like Cobalt Strike, encrypting files and rendering systems unusable.
Data is exfiltrated using Cobalt Strike’s beaconing capabilities or custom scripts over secure channels.
Conti encrypts critical files and leaves a ransom note, demanding payment to decrypt and avoid public exposure of stolen data.
Thousands of enterprise organizations rely on powerful AI-driven detections to find and stop attacks — before getting hit by a ransom note.
Conti ransomware is a ransomware-as-a-service operation that came onto the cyber attack scene in 2019. It’s extremely damaging ransomware due to the speed with which it encrypts data and spreads to other systems.
Conti was developed by the notorious Russian ransomware gang Wizard Spider in 2019, and was later used by numerous threat actors as ransomware-as-a-service (RaaS).
Conti ransomware is delivered by a variety of methods such as spear phishing and RDP attacks. Once inside the targeted system, it uses both data encryption and exfiltration for double extortion — the attacker can demand payment both for decryption and to avoid the release of stolen data.
Conti is known for targeting critical infrastructure and systems of government agencies and large companies across industries including healthcare and manufacturing.
Most Conti ransomware victims are in Canada and the United States, although notable attacks have also occurred in the United Kingdom.
More than 350 agencies and organizations fell prey to Conti Ransomware, collectively paying hundreds of millions in ransoms.
Conti ransomware victims have had to pay millions of dollars to not only get decryption keys but also to avoid the release of sensitive, stolen data.
In addition to preventative measures like multi-factor authentication and employee cyber security training, organizations can find and stop ransomware attacks early in their progression with AI-driven detections.
RaaS attacks like Conti use malware to infiltrate systems, steal files, encrypt files servers, and demand ransom payments for both decryption keys and to prevent the release of stolen data.
The best way to prevent ransomware like Conti is with AI-driven detections to catch attacks early in their progression.