The investigation report says that the Conti ransomware has been attacked more than 400 times in the U.S. and other international organisations. To secure the system, CISA and FBI have recommended describing things to the advisory that include network segmentation, multi-factor authentication, operating system, and up-to-date software.
While Conti considers the ransomware and does that variation that time developers proceed used affiliated cyber actor and make the successful attack, Conti actors mainly use the open-source Rclone command for doing the data, exfiltration so that after stealing the victim’s sensitive data they can employ the double extortion technique.
In this, they demand the victim to pay a ransom to release the encrypted data if that ransom has not been paid.
As per FBI and NSA network defender has to apply the mitigation to reduce the risk which will get compromised by the Conti ransomware attack.
CISA has a no-cost cyber hygiene service that helps organisations to get access, identity, and exposure to threats including ransomware. There are interagency resources that provide the guidance of the ransomware that protect, detect, and do the response.
Found this article interesting!! Follow us on Linkedin, Twitter, Facebook for daily Cyber Security News & Updates
A severe vulnerability has been identified in the Apache Parquet Java library, specifically within its parquet-avro module.…
A critical security flaw has been discovered in Halo ITSM, an IT support management software widely…
Several of Australia’s largest superannuation funds have been targeted in a coordinated cyberattack, leading to…
In a significant update to the popular dynamic instrumentation toolkit Frida, developers have introduced powerful…
OpenVPN, a widely-used open-source virtual private network (VPN) software, has recently patched a security vulnerability…
A critical vulnerability has been discovered in Apache Traffic Server (ATS), an open-source caching proxy…