The U.S. Department of State announced a $10 million reward for information leading to the identification of the leadership of the Conti ransomware group. Pictured: Presidential candidate Rodrigo Chaves of Progreso Social Democrático Party celebrates on April 3, 2022, in San Jose, Costa Rica. (Photo by Arnoldo Robert/Getty Images)
The U.S. Department of State announced Friday a reward of up to $10 million for information leading to the identification or location of leaders of the Conti ransomware organized crime group. The agency also offered an additional $5 million on information leading to the arrest and/or conviction of individuals conspiring to participate in a crime with the group.The department said the FBI estimates the group has over 1,000 victims over the last two years, with payouts exceeding $150 million, making Conti the costliest strain of ransomware ever documented.An attack on the government computers of Costa Rica in April was noted in the press release announcing the reward.
On Sunday, Costa Rican President Rodrigo Chaves declared a national emergency following being sworn into office. According to BleepingComputer, Conti published nearly all of the 672 GB of data belonging to Costa Rican government agencies.The ransomware gang allegedly demanded $10 million from Costa Rica's Ministry of Finance, which the government declined to pay.
An In-Depth Guide to Ransomware
Get essential knowledge and practical strategies to protect your organization from ransomware attacks.
Stephen Weigand is managing editor and production manager for SC Media. He has worked for news media in Washington, D.C., covering military and defense issues, as well as federal IT. He is based in the Seattle area.
The Cloak ransomware operation has laid claim on a significant cyberattack against the Virginia Attorney General's Office last month, reports SecurityWeek.
Oracle has dismissed the purported compromise of its Oracle Cloud single sign-on servers after threat actor 'rose87168' claimed to exfiltrate six million records belonging to the firm's customers, including encrypted Oracle Cloud SSO and LDAP passwords, Java KeyStore files, and Enterprise Manager JPS keys, among others, reports The Register. "There has been no breach of Oracle Cloud.
Organizations and individuals have been warned by the FBI's Denver office regarding the increasing prevalence of scams that use fake online file converter sites to facilitate the spread of malware, ransomware, and other malicious payloads, CBS News reports.