BSV
$66.33
Vol 75.26m
-4.4%
BTC
$90420
Vol 49763.95m
-0.18%
BCH
$436.79
Vol 979.84m
-5.45%
LTC
$88.85
Vol 2220.05m
-3.27%
DOGE
$0.36
Vol 9455.45m
-0.82%
Getting your Trinity Audio player ready...

The U.S. State Department is offering up to $15 million in rewards for any information that can help it cracking down on Conti, a Russia-based ransomware group. Conti is reported to have received over $150 million in ransom payments, making it the costliest ransomware variant in history.

In a press statement, department spokesperson Ned Price said that the $10 million is for information leading to “the identification and/or location of any individual(s) who hold a key leadership position in the Conti ransomware variant transnational organized crime group.”

In addition, the department will offer $5 million for information that leads to the arrest of any individual that attempts to, or does participate in the Conti ransomware incident.

Conti has been wreaking havoc globally for the past two years, with its orchestrators attacking anything from global entities to governments and even critical services like healthcare. As of January, the FBI estimates that the group had attacked over 1,000 entities who had paid over $150 million in ransom. This makes the Conti ransomware variant the costliest strain of ransomware ever documented.

The $15 million in total reward is offered under the department’s Transnational Organized Crime Rewards Program.

Price commented, “In offering this reward, the United States demonstrates its commitment to protecting potential ransomware victims around the world from exploitation by cyber criminals.”

Conti is a ransomware-as-a-service operation with links to Wizard Spider, a Russian-speaking cybercrime group which has also been behind other variants including Ryuk and TrickBot. According to security experts, it emerged in 2020 and has grown rapidly. One expert, Cyberint’s Shmuel Gihon estimates that in total, the group has raked in $2.7 billion, way above the State Department’s estimate.

The best organized hackers’ collective ever

Aside from being based in Russia with possible links to the FSB, not much else was known about Conti. This all changed in early March when a series of documents leaked revealing its size, operations, leadership and even the source code of its ransomware.

Researchers say it all started with the Russian invasion of Ukraine. Being a Russian group, Conti expressed its support for the Kremlin, and this didn’t sit well with some of its Ukrainian members. Just days after the invasion, a new Twitter account cropped up and started leaking the most secretive details about the organization.

The most surprising revelation about Conti was just how professionally it’s run. It has a hierarchical management structure with well-defined roles, a finance department that pays salaries, a HR department that hires and fires, team leaders for the smaller units and even a research and development (R&D) department.

Security experts who took a deep dive into the leaks further found that Conti has salaried workers, some of whom are paid in BTC, an employee referral program and even an “employee of the month” who earns half their salary in a bonus payment.

It gets even more interesting with its hiring process. Cyberint found that Conti hires from both the criminal underground as well as legitimate sources such as Russian headhunting firms. As observed by Daniel Krebs, a security expert and a former Washington Post reporter, hiring is crucial since “perhaps unsurprisingly, the turnover, attrition and burnout rate was quite high for low-level Conti employees.”

The most alarming thing about the hiring process is that Conti executives don’t reveal to their potential hires that they are one of the biggest collectives of hackers. Experts found evidence that some of the workers think they work for a legitimate tech firm.

“Alarmingly, we have evidence that not all the employees are fully aware that they are part of a cybercrime group. These employees think they are working for an ad company, when in fact they are working for a notorious ransomware group,” one researcher observed.

The leaks also revealed that Conti is based in Russia, although its physical offices remain a mystery. Researchers believe that this is proof that the group has ties to the Kremlin, or at the very least, the FSB, Russia’s counterintelligence force, formerly known as the KGB.

“Our assumption is that such a huge organization, with physical offices and enormous revenue would not be able to act in Russia without the full approval, or even some cooperation, with Russian intelligence services.”

Watch: CoinGeek New York panel, Investigating criminal activity on the blockchain

Recommended for you

Sentinel Node upholds heightened security with 56M snapshots
CERTIHASH keeps up with its mission to offer enterprises heightened security for their data with BSV-powered Sentinel Node, recently registering...
November 14, 2024
ODHack 9.0: Better wallet, easy testnet coins for developers
OnlyDust's ODHack 9.0 hackathon event provides developers building on the BSV blockchain with new ways to test their applications without...
November 8, 2024
Advertisement
Advertisement
Advertisement