Monti, noul Conti: banda de ransomware folosește codul reciclat PlatoBlockchain Data Intelligence. Căutare verticală. Ai.

Monti, noul Conti: Gang Ransomware folosește cod reciclat

Analysts have discovered a ransomware campaign from a new group called “Monti,” which relies almost entirely on leaked Conti code to launch attacks.

The Monti group emerged with a round of ransomware attacks over the Independence Day weekend, and was able to successfully exploit the Vulnerabilitatea Log4Shell to encrypt 20 BlackBerry user hosts and 20 servers, BlackBerry’s Research and Intelligence Team reported.

After further analysis, researchers discovered that the indicators of compromise (IoCs) for the new ransomware attacks were the same as in previous Conti ransomware attacks, with one twist: Monti incorporates the Acrion 1 Remote Monitoring and Maintenance (RMM) Agent.

But rather than being Conti reborn, the researchers said they believe Monti lifted Conti’s infrastructure când a fost leaked last spring, during February and March.

“As additional ransomware-as-a-service (RaaS) solution builders and source code become leaked, either publicly or privately, we could continue to see these doppelganger-like ransomware groups proliferate,” the BlackBerry team added. “General familiarity with the TTPs [tactics, techniques and procedures) of known groups can help us identify any unique traits of these lookalike crews.”

Fiți la curent cu cele mai recente amenințări la adresa securității cibernetice, vulnerabilități recent descoperite, informații despre încălcarea datelor și tendințe emergente. Livrat zilnic sau săptămânal direct în căsuța de e-mail.

Timestamp-ul:

Mai mult de la Lectură întunecată