Saturday, February 22, 2025
HomeCyber AttackCISA Observed Raise in Conti Ransomware Attacks Targeting Over 400 U.S. and...

CISA Observed Raise in Conti Ransomware Attacks Targeting Over 400 U.S. and International Organizations

Published on

SIEM as a Service

Follow Us on Google News

The investigation report says that the Conti ransomware has been attacked more than 400 times in the U.S. and other international organisations. To secure the system, CISA and FBI have recommended describing things to the advisory that include network segmentation, multi-factor authentication, operating system, and up-to-date software.

Technical Factors

While Conti considers the ransomware and does that variation that time developers proceed used affiliated cyber actor and make the successful attack, Conti actors mainly use the open-source Rclone command for doing the data, exfiltration so that after stealing the victim’s sensitive data they can employ the double extortion technique.

In this, they demand the victim to pay a ransom to release the encrypted data if that ransom has not been paid.

Multi-factor Authentication

As per FBI and NSA network defender has to apply the mitigation to reduce the risk which will get compromised by the Conti ransomware attack.

  1. It requires multi-factor authentication to get remote access from an external source.
  2. They enable the strong spam filter that prevents the phishing email that comes from the end-users and implement the user training program that discourages the user from visiting a malicious website for opening malicious attachments. Filter emails also contain the executable file to prevent them from reaching the end-users.
  3. They also set the antivirus program to conduct the regular scan so that network assets can get up-to-date signatures.
  4. They do scanning for vulnerability and upgrade all types of software and operating system. Application, and firmware everything goes in a timely manner.
  5. Removing applications is not necessary on day to day basis. But the Conti threat actor has to monitor and manage the software to aid the malicious exploitation of the ant organisation’s enterprise.
  6. The detection response tool has to allow a high degree of visibility to help effectively, to protect malicious cyber actors.
  7. They have to secure the user account, which has been done by the audit administrative user who can configure the access control.

Few Additional Resources

CISA has a no-cost cyber hygiene service that helps organisations to get access, identity, and exposure to threats including ransomware. There are interagency resources that provide the guidance of the ransomware that protect, detect, and do the response.

Found this article interesting!! Follow us on Linkedin,  Twitter,  Facebook for daily Cyber Security News & Updates

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

SPAWNCHIMERA Malware Exploits Ivanti Buffer Overflow Vulnerability by Applying a Critical Fix

In a recent development, the SPAWNCHIMERA malware family has been identified exploiting the buffer...

Sitevision Auto-Generated Password Vulnerability Lets Hackers Steal Signing Key

A significant vulnerability in Sitevision CMS, versions 10.3.1 and earlier, has been identified, allowing...

NSA Allegedly Hacked Northwestern Polytechnical University, China Claims

Chinese cybersecurity entities have accused the U.S. National Security Agency (NSA) of orchestrating a...

ACRStealer Malware Abuses Google Docs as C2 to Steal Login Credentials

The ACRStealer malware, an infostealer disguised as illegal software such as cracks and keygens,...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

SPAWNCHIMERA Malware Exploits Ivanti Buffer Overflow Vulnerability by Applying a Critical Fix

In a recent development, the SPAWNCHIMERA malware family has been identified exploiting the buffer...

Sitevision Auto-Generated Password Vulnerability Lets Hackers Steal Signing Key

A significant vulnerability in Sitevision CMS, versions 10.3.1 and earlier, has been identified, allowing...

NSA Allegedly Hacked Northwestern Polytechnical University, China Claims

Chinese cybersecurity entities have accused the U.S. National Security Agency (NSA) of orchestrating a...