profile-img
BleepingComputer

@BleepinComputer

Breaking cybersecurity and technology news, guides, and tutorials that help you get the most from your computer. DMs are open, so send us those tips!

calendar_today23-06-2009 16:41:34

31,3K Tweets

212,8K Followers

175 Following

BleepingComputer(@BleepinComputer) 's Twitter Profile Photo

Since December 2019, BleepingComputer has been monitoring the steady trickle of victims for an enterprise-targeting ransomware known as Conti. In June 2020, the victims started coming in at a more rapid pace, as shown by the submission to ID Ransomware.

Since December 2019, BleepingComputer has been monitoring the steady trickle of victims for an enterprise-targeting ransomware known as Conti. In June 2020, the victims started coming in at a more rapid pace, as shown by the submission to ID Ransomware.
account_circle
BleepingComputer(@BleepinComputer) 's Twitter Profile Photo

Advanced Intel's Vitali Kremez has told BleepingComputer that Conti and Ryuk share similar code and that Conti is believed to be based off of Ryuk version 2.

account_circle
BleepingComputer(@BleepinComputer) 's Twitter Profile Photo

It is not known if the Ryuk threat actors decided to splinter, re-brand, or transition to “Conti”, but one of the Conti ransom notes seen by BleepingComputer is an exact match for a Ryuk note used in attacks in 2018.
bleepingcomputer.com/news/security/…

It is not known if the Ryuk threat actors decided to splinter, re-brand, or transition to “Conti”, but one of the Conti ransom notes seen by BleepingComputer is an exact match for a Ryuk note used in attacks in 2018. bleepingcomputer.com/news/security/…
account_circle
BleepingComputer(@BleepinComputer) 's Twitter Profile Photo

Furthermore, Kremez has told BleepingComputer that the same TrickBot infrastructure is being used by both Ryuk and the Conti threat actors as part of their ransomware attacks.

account_circle