IT Pro is supported by its audience. When you purchase through links on our site, we may earn an affiliate commission. Learn more

CISA, FBI, and NSA issue a Conti ransomware advisory

Joint statement with the FBI and the NSA warns of increased attacks from the Conti Ransomware

FBI, DOJ badge on a crest

CISA, the Federal Bureau of Investigation (FBI), and the National Security Agency (NSA) have released a joint Cybersecurity Advisory (CSA) alerting organizations of increased Conti ransomware attacks.

The advisory warned that organizations needed to take supplementary measures to increase their level of security. The three agencies added that the operators behind Conti already conducted over 400 attacks on US and international organizations.

“To secure systems against Conti ransomware, CISA, FBI, and the National Security Agency (NSA) recommend implementing the mitigation measures described in this Advisory, which include requiring multi-factor authentication (MFA), implementing network segmentation, and keeping operating systems and software up to date,” the advisory read.

While Conti is considered a ransomware-as-a-service (RaaS) model, there is variation in its structure that differentiates it from a typical affiliate model. Conti developers likely pay ransomware deployers a wage rather than a percentage of the proceeds from a successful attack, according to CISA.

Rob Joyce, director of cyber security at the NSA, said the cyber criminals now running the Conti ransomware-as-a-service have historically targeted critical infrastructure, such as the Defense Industrial Base (DIB). “The advisory highlights actions organizations can take right now to counter the threat,” he added.

“We highly recommend using the mitigations outlined in this advisory to protect against Conti malware and mitigate your risk against any ransomware attack.”

Related Resource

Challenging the rules of security

Protecting data and simplifying IT management with Chrome OS

Whitepaper front coverFree download

Natalie Page, threat intelligence analyst at Talion, told ITPro that increased activity from a big player like Conti undoubtedly raises alarm bells across the threat landscape.

“This is a strain known to actively target organizations within the United States, a country which in 2021 fell victim to some of the largest and most destructive ransomware attacks the community has witnessed thus far,” she said.

“With the disappearance of REvil earlier this year, many affiliates shifted strains, with Conti being one of the popular variants adopted by these criminals, explaining this rapid increase in attack attempts, with the FBI confirming that they have witnessed at least 400 individual attacks against domestic and foreign institutions.”

Robert Golladay, EMEA and APAC director at Illusive, told ITPro that hackers are constantly stepping up their game and improving their tools to increase their success rate. 

“And then sharing what works - they effectively operate a "GitHub" for attackers, sharing code once they've been successful with a technique. Once an attacker is in the network, which inevitably will happen, it won’t take them long to move laterally to target "crown jewels". At this point it’s too late for companies to save their valuable data and assets,” he said.

Featured Resources

IT best practices for accelerating the journey to carbon neutrality

Considerations and pragmatic solutions for IT executives driving sustainable IT

Free Download

The Total Economic Impact™ of IBM Spectrum Virtualize

Cost savings and business benefits enabled by storage built with IBMSpectrum Virtualize

Free download

Using application migration and modernisation to supercharge business agility and resiliency

Modernisation can propel your digital transformation to the next generation

Free Download

The strategic CFO

Why finance transformation propels business value

Free Download

Recommended

SOC modernisation and and the role of XDR
Whitepaper

SOC modernisation and and the role of XDR

16 Mar 2023
Analysing the economic benefits of Trend Micro Vision One
Whitepaper

Analysing the economic benefits of Trend Micro Vision One

16 Mar 2023
More than a number: Your risk score explained
Whitepaper

More than a number: Your risk score explained

16 Mar 2023
The IT manager's guide to getting home in time for dinner
Whitepaper

The IT manager's guide to getting home in time for dinner

15 Mar 2023

Most Popular

The big PSTN switch off: What’s happening between now and 2025?
Sponsored

The big PSTN switch off: What’s happening between now and 2025?

13 Mar 2023
Why Amazon is cutting staff from AWS
Cloud

Why Amazon is cutting staff from AWS

21 Mar 2023
Why – and how – IP can be the hero in your digital transformation success story
Sponsored

Why – and how – IP can be the hero in your digital transformation success story

6 Mar 2023