The investigation report says that the Conti ransomware has been attacked more than 400 times in the U.S. and other international organisations. To secure the system, CISA and FBI have recommended describing things to the advisory that include network segmentation, multi-factor authentication, operating system, and up-to-date software.
While Conti considers the ransomware and does that variation that time developers proceed used affiliated cyber actor and make the successful attack, Conti actors mainly use the open-source Rclone command for doing the data, exfiltration so that after stealing the victim’s sensitive data they can employ the double extortion technique.
In this, they demand the victim to pay a ransom to release the encrypted data if that ransom has not been paid.
As per FBI and NSA network defender has to apply the mitigation to reduce the risk which will get compromised by the Conti ransomware attack.
CISA has a no-cost cyber hygiene service that helps organisations to get access, identity, and exposure to threats including ransomware. There are interagency resources that provide the guidance of the ransomware that protect, detect, and do the response.
Found this article interesting!! Follow us on Linkedin, Twitter, Facebook for daily Cyber Security News & Updates
A security researcher, exploring reverse engineering and exploit development, has successfully identified a critical vulnerability…
A security vulnerability has been identified in Brave Browser, potentially allowing malicious websites to masquerade…
A recent phishing campaign has targeted customers of SBI Bank through a deceptive message circulating…
The Gootloader malware family employs sophisticated social engineering tactics to infiltrate computers. By leveraging compromised…
A significant security vulnerability, designated CVE-2025-21613, has been discovered in the go-git library, used for…
Colm O hEigeartaigh announced a critical vulnerability affecting various versions of Apache CXF, a widely-used…