Background on Conti Ransomware Cyberattacks
In summary, Conti is a ransomware-as-a-service (RaaS) model ransomware variant. Accordingly, Conti users often gain initial access to networks through the following:- “Spearphishing campaigns” using tailored emails that contain malicious attachments or malicious links. For example, malicious Microsoft Word attachments often include embedded scripts that can download or drop other malware.
- Stolen or weak Remote Desktop Protocol (RDP) credentials;
- Phone calls;
- Fake software promoted via search engine optimization;
- Other malware distribution networks; and
- Common vulnerabilities in external assets.
Recommendations to Prevent Ransomware Cyberattacks
Generally, in the September 2021 Alert, the CISA and the FBI recommend that employers take the following steps to prevent cyberattacks:- Use multi-factor authentication to remotely access networks from external sources.
- Implement network segmentation to reduce the spread of malware.
- Filter network traffic to prohibit the presence of malicious IP addresses.
- Scan for vulnerabilities and keep software updated.
- Remove unnecessary applications and apply controls as to what software to use and download.
- Implement endpoint and detection response tools to protect against any malicious cyber activity.
- Limit access to resources over the network.
- Secure user accounts to ensure all users are legitimate users.