![]() ![]() And the keys to this particular variant were included in the new leaked Conti data. Ukraine invasion blew up Russian cybercrime alliancesĪccording to Kaspersky, the strain its researchers spotted in December 2022 was used in "multiple attacks" against corporations and government agencies.Among the thousands of ESXiArgs ransomware victims? FBI and CISA to the rescue.Been hit by BianLian ransomware? Here's your get-out-of-jail-free card.US, UK slap sanctions on Russians linked to Conti, Ryuk, Trickbot malware. ![]() And these different variants of Conti ransomware have since been used to infect computers over the last year. This led to multiple modifications of the malware by various other criminal gangs, plus ex-Conti members moving on and working with other miscreants. In February 2022, however, after Conti declared its full support of the Russian government" and the illegal invasion of Ukraine, a sunflower nation security researcher leaked hundreds of Conti's internal files including its source code.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |