Conti Ransomware Gang: An Analysis of the Group’s Motives and Methods by Kameron A. Williams A Capstone Project Submitted to the Faculty of Utica University August 2022 in Partial Fulfillment of the Requirements for the Degree of Master of Science in Cybersecurity © Copyright 2022 by Kameron A. Williams All Rights Reserved ii Abstract This research project aims to provide a threat assessment of the Conti ransomware gang (Conti). The research first examined Conti’s Russian origins and their motivations. Next, the paper reviewed disruptive cyber-attacks by Conti against large organizations and the outcomes of these attacks. The research also investigated Conti’s effort to rebrand itself to avoid sanctions by associating itself with the Russian government. Next is an analysis of Conti’s techniques, tactics, and procedures (TTP) used to compromise victims, execute the Conti ransomware, and demand payments through ransom negotiations. Conti is a significant threat to all public and private businesses and entities, but they primarily target the healthcare industry. Conti targets the healthcare sector and hospitals at a higher rate because they can typically afford the millions in ransom demanded. Conti is also using cyber-attacks to aid in their rebranding to evade sanctions incurred by its support of the Russian invasion of Ukraine. Lastly, the research paper analyzes how to prevent or minimize a successful Conti attack at various phases of their attack. Security professionals need to understand the threat that Conti poses to organizations and how they can mitigate successful Conti attacks. Keywords: Cybersecurity, Professor Carmen Mercado, Conti Costa Rica, Conti Ransomware Analysis, Conti Ransomware Gang, Ransomware-as-a-Service, Russia Ransomware. iii Table of Contents List of Illustrative Materials.............................................................................................................v Conti Ransomware Gang: An Analysis of the Group’s Motives and Methods ...............................1 Ransomware-as-a-Service........................................................................................................... 1 The Conti Ransomware Gang ..................................................................................................... 2 Conti’s Targets ............................................................................................................................ 4 Purpose Statement ....................................................................................................................... 6 Literature Review.............................................................................................................................7 Conti’s Russian Origin................................................................................................................ 8 Conti’s Organizational Structure .............................................................................................. 10 High-profile Conti Attacks ....................................................................................................... 12 The Healthcare Service Executive Attack ............................................................................ 13 The Costa Rica attack ........................................................................................................... 15 Understanding the Cyber Kill Chain......................................................................................... 16 Ransomware Infection .............................................................................................................. 18 Conti Email Phishing ............................................................................................................ 19 Privilege Escalation .............................................................................................................. 20 Ransomware Execution ............................................................................................................ 21 Ransomware Extortion.............................................................................................................. 23 Ransom Negotiations ............................................................................................................ 24 Discussion of the Findings .............................................................................................................25 Conti’s Motivations .................................................................................................................. 26 Impact of Conti Attacks ............................................................................................................ 27 Conti’s Attack Patterns ............................................................................................................. 29 Recommendations ..........................................................................................................................31 Future Research .............................................................................................................................35 Conclusion .....................................................................................................................................37 References ......................................................................................................................................42 iv List of Illustrative Materials Figure 1 – Lockheed Martin Cyber Kill Chain Model ..................................................................17 v Conti Ransomware Gang: An Analysis of the Group’s Motives and Methods Ransomware is malware that blocks access to the device until the victim pays a ransom specified by the malware operator. Attackers typically require ransom payments paid via the cryptographic currency system, Bitcoin, due to the anonymity of cryptocurrency (PaquetClouston et al., 2019). Ransomware started as a proof of concept in 1996 by researchers Young and Yung when they posed the idea of using cryptographic procedures offensively. They suggested cryptography as an extortion technique by preventing access to a device until the attacker’s demand is met (Hull et al., 2019). Today, ransomware attacks are the most concerning form of cybercrime, and law enforcement agencies and cyber security professionals across the globe are seeking ways to deal with the increasing threat (Paquet-Clouston et al., 2019). The early days of ransomware saw its distribution on a massive scale, with little regard for the infected victims’ financial holdings. These early ransomware attacks also saw malware delivered on mass to infect as many victims as possible rather than specifically target a singular entity (Eurpol, 2021). However, ransomware attacks changed to target private businesses, government agencies, and critical infrastructures increasingly. The increase in attacks on larger institutions shows that ransomware operators choose their victims based on their financial capabilities and willingness to comply with ransoms. By doing so, perpetrators have the chance to demand and receive higher ransoms more quickly from victims on the successful execution of their ransomware. The Conti ransomware gang (Conti) is a prime example of a ransomware gang that seeks high-profile targets for exploitation (Europol, 2021). Ransomware-as-a-Service Ransomware has evolved into two forms of attacks in preventing file access on infected devices. The first is locking a user out of their device by disabling its operating system. In these 1 attacks, the victim views the ransom note once the device is booted, preventing them from accessing it until the ransom gets paid or removed (Paquet- Clouston et al., 2019). The second form of attack is much more sophisticated and used by Conti. This attack sees the victim’s files on a device become encrypted, so paying a ransom is the only way to decrypt the files (PaquetClouston et al., 2019). The RaaS model allows customers to use ransomware owned by service providers through darknet marketplaces (Meland et al., 2020). These service providers deliver ransomware tailored to the buyer’s specific target, with some providers offering additional services like privilege escalation or ransom negotiation. After an attacker’s successful exploitation and the victim pays the ransom, the service provider receives a portion of the ransom, 20%-30%, as a fee (Meland et al., 2020). The RaaS model is most threatening because it empowers cybercriminals without the necessary programming skills to utilize ransomware, increasing the number of individuals behind ransomware attacks. The Conti Ransomware Gang Conti is one of the infamous ransomware families responsible for several high-profile ransomware attacks. Conti gets credit as a descendant of the Ryuk ransomware, and the creators of Ryuk are likely responsible for the development of Conti (Trend Micro, 2021). Conti’s attacks are regularly against much larger targets. The Conti ransomware is also sold under the RaaS model and significantly contributes to the spike in ransomware attacks. Conti extorts even more money from their victims through the double extortion ransomware technique (Trend Micro, 2021). Through double extortion, Conti not only encrypted a victim’s files but also stole their files and confidential data. Conti then forces their victims to pay for access to their files and a separate ransom to prevent them from publishing or selling the stolen data (Trend Micro, 2021). 2 One of the aspects of Conti’s methods that are so threatening is their choice of targets. Conti targets businesses and governments worldwide, but most attacks are against United States institutions (Trend Micro, 2021). From January 1, 2021, to November 12, 2021, Conti attempted over 1.6 million attacks against companies in the United States. The attacks against companies in the Netherlands rank the second-highest during this period, at nearly 49 thousand attempted attacks (Trend Micro, 2021). Part of the reason for the disparity in attack frequency comes from the motivations of Conti. While most ransomware gangs are monetarily motivated, Conti is also motivated by the desires of their country. Conti is based and primarily operated out of Russia. Russia allows cybercrime groups to operate out of the country with relative freedom. The Russian government is widely known to overlook ransomware attacks from their country as long as the perpetrators avoid attacks against Russia and Russian companies (Burgess, 2022). Because of this freedom, most ransomware gangs trace back to Russia. Some ransomware strains never attack Russian organizations because of how the malware code. Some ransomware strains run scans on an infected network to detect if that network lies within Russian Controlled areas. The ransomware will shut itself down if the infected network is in a Russian-controlled state, preventing its execution (Freeze, 2022). Conti is tied to the interests of the Russian government, specifically Vladimir Putin, on a much closer level. Leaks from Conti’s chat messages show that the ransomware gang is connected to Russia and is involved with the government’s state-sponsored hackers (Burgess, 2022). Being encouraged by the Russian government led Conti to attack critical infrastructure and industries. For example, the Coronavirus (COVID-19) pandemic began in March 2020 and contributed to increased cyber-attacks against the healthcare industry. COVID-19 caused most governments to perform lockdowns to prevent the spread of the disease, and with that came an 3 increase in remote working (Minnaar & Herbig, 2021). Cybercriminals, including Conti, quickly exploited the new remote working trend. Conti’s Targets Conti is responsible for a major attack on Ireland’s Healthcare Services Executive (HSE) that caused significant disruptions and forced many healthcare professionals to revert to using pen and paper to continue treating patients. The HSE attack began on May 14, 2021, when the Conti ransomware compromised their network (PWC, 2021). Although the HSE attempted to mitigate the damage by the ransomware through its Critical Incident Process, they lost access to all Information Technology (IT) systems. The affected IT systems included critical systems like patient information, clinical care, payroll, and procurement systems. Conti hid in the HSE’s network before the ransomware’s execution, stealing confidential information. Despite the HSE’s efforts, Conti demanded ransom for access to encrypted machines and the previously stolen confidential information (PWC, 2021). Although the attack against the HSE proves Conti does not regard the consequences of its targets, Conti will also attack entire governments if they deem it necessary. Conti also attacked the Costa Rican government in May 2022. Conti’s attack against Costa Rica is widely different because Conti’s intent is much more sinister (Faife, 2022). The ransomware attack massively disrupted the government and affected an estimated 27 government agencies, including the Finance Ministry and the Ministry of Labor and Social Security. Costa Rica’s President Chaves declared war against Conti due to their statements about their attack. Conti publicly stated that their goal in the attack was to “overthrow the government utilizing a cyberattack” (Faife, 2022, para. 4). Although the attack may seem non-monetarily motivated, Conti still demanded a large 4 ransom from Costa Rica. The original ransom of $10 million changed to $20 million after Costa Rica refused to pay (Faife, 2022). Conti regularly partners with other malware gangs to aid in distributing their ransomware. Documentation shows that threat actors such as Conti and Emotet will use a combination of each other’s malware during an attack. Emotet is another malware gang based in Russia. Emotet uses mass email phishing campaigns in its attacks against organizations. During these attacks, Emotet sends emails with malicious attachments that, when executed, download separate malware from a staging site (Computer Fraud & Security, 2021). The cybercrime intelligence group Intel 471 assessed with high confidence that victims infected through Emotet’s malware spam operation enter a collection where they eventually get infected with Conti ransomware (Intel 471, 2022). This correlation between Emotet and Conti victims offers an insight into how often and easily targets get infected with the Conti ransomware. This research project discovered a gap in available research when attempting to uncover Conti’s new encryption method for the Conti ransomware. Conti previously incorporated the Advanced Encryption Standard-256 (AES-256) when the Conti ransomware initially executed and encrypted files on an infected system (CrowdStrike Intel Team, 2022). AES is a block cipher technique commonly used in standard encryption due to its speed and versatility. AES-256 builds upon this by encrypting data with 256-bit keys, leading to more secure encryption (Utami et al., 2019). However, an August 2020 update saw Conti’s ransomware use the ChaCha Cipher as a new encryption method during execution. As a result, the ChaCha Cipher gets used in subsequent Conti encryptions since the 2020 update. There is currently not much information on the ChaCha Cipher, although the change in cipher will allow a more efficient approach to 5 selecting files to encrypt (CrowdStrike Intel Team, 2022). Further studying the ChaCha Cipher can lead to future decryption of the Conti ransomware. Purpose Statement The purpose of this research project was to provide a threat assessment of the Conti ransomware gang by uncovering the group’s motivations and methods used to distribute the malware and extort their victims. This paper examines why Conti targets companies, critical infrastructure, and government entities without regard to consequences. Because Conti is willing to attack various organizations, it is also important to understand how Conti and its affiliates perpetrate their attacks. By knowing how Conti begins their attack and what its ransomware does after execution, security professionals can create detections for Conti’s indicators of attack. The general problem is that Conti remains one of the most relentless cybercriminal organizations. Conti uses sophisticated ransomware and techniques to attack businesses, critical infrastructure, and governmental agencies (Hickman, 2021). Because of this, it is difficult to understand how their attacks happen and how to mitigate or prevent them from occurring. The specific problem is that the attacks perpetrated by Conti have dire consequences, especially when its targets are critical infrastructure and government entities (Minnaar & Herbig, 2021). Conti will target most organizations regardless of their renown or sovereignty, except for the Russian government and its allies (Freeze, 2022). Furthermore, the evolution of Conti’s organizational structure and its ransomware-as-a-service model is something that future ransomware gangs will adopt (Microsoft Security, 2022). Therefore, security professionals also need to understand Conti’s methods to discover the indicators of a Conti attack. The project intended to answer the following questions: 1) How is the Conti ransomware gang a threat to global organizations? 2) What attacks are the Conti ransomware gang and 6 affiliates responsible for, and what have been their outcomes? And 3) What are Conti’s techniques, tactics, and procedures (TTPs) throughout the Conti ransomware’s execution? The research utilized for this project includes peer-reviewed journals, newspaper articles, and cyber security articles. The researched information presented in this project is for cyber security professionals and individuals seeking to understand the Conti cybercriminal organization. The material gained from this study provides information for those seeking to learn about Conti and why they are considered a dangerous ransomware gang. This research provides the knowledge necessary for cyber security professionals to know who Conti’s primary targets are and some insight into why they are targets. Additionally, cyber security professionals will learn the TTPs employed by Conti to incorporate indicators of attack for the Conti ransomware. Literature Review The ransomware-as-a-service (RaaS) model is an agreement between the ransomware operator and an affiliate that purchases the malware. Ransomware operators are responsible for creating and sustaining the equipment used in ransomware operations. Some equipment operators can be responsible for builders that create ransomware executables and the payment portals used to obtain ransoms from their victims (Microsoft Security, 2022). Several RaaS platforms will also contain additional support to their affiliates during the extortion process of an attack. The support may include creating information-sharing sites to display exfiltrated data from their victims. Through this, the affiliate can prove to the victim that they got breached and the affiliate stole their data (Microsoft Security, 2022). Ransomware operators may sometimes offer support in retrieving ransom payments from their affiliates’ victims. Operators can communicate with victims and pressure them into paying 7 the ransom, typically in some form of cryptocurrency. Some affiliates use operators to compromise their targets and do not care about the payload or access gained from the operator’s initial compromise. The affiliate can then use the newly gained access as a server to perform other actions like privilege escalation or data exfiltration within the compromised network (Microsoft Security, 2022). The Conti ransomware gang also utilizes the affiliate model in ransomware attacks and uses its operators to gain initial access, retrieve confidential data, and execute ransomware (Trend Micro, 2021). The Conti ransomware is used in ransomware-as-a-service and gets utilized in prominent attacks. Conti ransomware operators also use double extortion techniques and require their victims to pay additional ransom payments. Ransomware operators use double extortion by stealing confidential data from their target during their initial intrusion into their victim’s network. Then, operators threaten to sell this stolen data unless the additional ransom is paid (Trend Micro, 2021). Countries across the globe realize that several active ransomware gangs choose to operate out of countries such as Russia. However, Russia does not hold these criminal groups accountable and shelters them from the deserved global retribution for their malicious attacks. During the previous G-7 summit in June 2021, the G-7 committed to holding Russia accountable for the malware groups (Nakashima, 2021). Conti’s Russian Origin Many ransomware attacks on US-based private and government agencies point back to Russia. Most of the ransomware analyzed operates so that it would avoid executing on Russianspeaking victims (Sanger & Perlroth, 2021). On the July 4 weekend in 2021, the software company Kaseya fell victim to a ransomware attack perpetrated by the Russian-based 8 ransomware group REvil. Kaseya’s software SolarWinds manages technology for other smaller businesses. After REvil compromised Kaseya, the group used SolarWinds to breach at least 1,500 companies using the software (Sanger & Perlroth, 2021). A separate Russian-based ransomware group, DarkSide, compromised the Colonial Pipeline in May 202l. The Colonial Pipeline is the United States’ largest refined fuel pipeline. After DarkSide launched its attack on the Colonial Pipeline, in addition to the $5 million ransom Colonial Pipeline paid, the Southeast of the United States also suffered from gasoline shortages (Nakashima, 2021). Although the Russian government could reprimand the criminal actors in their country, it is unlikely that they will without significant actions taken by the United States government. Rarely are Russia and its close allies the victims of ransomware attacks. Some ransomware avoids execution on Russian-speaking systems. Ransomware can scan an infected network and determine if the network or its devices lie within the Russian Commonwealth of States (CIS). Should the infected network be located in the CIS, the ransomware can shut itself down, preventing the attack from proceeding further. Jeremy Kennelly of the cybersecurity company Mandiant stated, “You effectively see minimal or no CIS targeting in the known victim lists of any major ransomware operator” (Freeze, 2022, para. 18). Kennelly further stressed the Russia ransomware point by also stating that the largest ransomware groups (which would include Conti) would rather have Russian speaking affiliates (Freeze, 2022). More recently, Conti has publicly sided with the Russian government and supports their invasion of Ukraine in February 2022. In May 2022, the cybersecurity threat intelligence group Advanced Intel claimed that this support was more than a vocal announcement and that the group had not received any ransoms since the invasion started. The stoppage of ransom payments is likely due to sanctions levied by the United States government. Advanced Intel 9 stated that “the group [Conti] can no longer sufficiently support and obtain extortion” (Culafi, 2022, para. 6). Advanced Intel further stated that Conti’s victims get forbidden from paying demanded ransoms before the invasion. Advanced Intel also claims that some of Conti’s victims refuse to make payments to Conti as they are now essentially a ransomware group sponsored by the Russian State (Culafi, 2022). Conti’s Organizational Structure A thought-provoking aspect of the Conti gang that differs from most ransomware gangs is that they structure themselves like a legitimate organization. The cyber security software company, Check Point Software, offers software and products to protect their customers from various forms of malware, denial of service, and other cyber-attacks. Security researchers at Check Point Software discovered that Conti hires for and maintains various organizational departments such as human resources, management, and finance (Landau, 2022). These departments operate in a typical managerial fashion, with employees reporting to management reporting to upper management. Conti employs salaried employees paid in Bitcoin and negotiators paid on commission of paid ransoms. One of the more surprising details discovered is that Conti also has an employee of the month program where a chosen employee has rewarded a bonus that is half their salary (Landau, 2022). An anonymous Ukrainian cybersecurity researcher released over 60,000 leaked Conti chat logs and files in late February 2022. The chat logs provide glimpses into how Conti interacts with the Russian government. The Conti chat leaks also provide an insight into how the organization’s internal departments are structured. Conti shares many similarities with legitimate businesses in their structure of organizational hierarchy. This normality extends to Conti’s hiring process with a Human Resources department that interviews and hires potential employees 10 (Krebs, 2022a). Conti maintains various other departments with budget allocation, staff, and management. However, some of these departmental units’ operations betray a typical business’s familiarity. For example, Conti employs units dedicated to creating and integrating malicious code into malware and other technologies, as well as testers that obfuscate the code and run their malware against security tools attempting to bypass it (Krebs, 2022a). Conti has departments responsible for searching for computer vulnerabilities and weaknesses through disassembling computer code for other departments’ exploitation. The departments responsible for exploiting vulnerabilities create and manage command-and-control servers. The command-and-control servers exfiltrate data and install the Conti ransomware on the infected device (Krebs, 2022a). Cybersecurity researchers monitoring Conti at Advanced Intel found that on May 19, 2022, Conti shut down their internal infrastructure. The Conti Tor admin pages used to publish content and negotiate ransom payments with victims are no longer operational, leading the researchers to believe that a significant shake is occurring with the ransomware gang. It is not likely that the Conti ransomware group will disappear completely. Conti will likely remain an active threat through partnerships with other ransomware groups, effectively shedding their names while operating under the same leadership (Abrams, 2022). Ransomware families tend to rebrand themselves once pressured enough by global law enforcement. For example, after the United States Department of Justice recovered much of the Colonial Pipeline ransom and an individual seized DarkSide’s internet servers, DarkSide announced its shutdown. DarkSide’s shutdown coincided with the start of BlackMatter, a new ransomware gang using the same unique encryption techniques used by DarkSide. Experts believe that DarkSide is a rebranded version of BlackMatter. Likewise, REvil shut itself down at about the same time that DarkSide shut down. However, the CEO of Intel 471 stated that it is 11 still uncertain if BlackMatter is the REvil crew or if it is a rebranding of DarkSide. Conti’s abrupt shutdowns of its services could also indicate a rebranding with the United States’ recent offer of $10 million for information on Conti affiliates and operators (Krebs, 2021). High-profile Conti Attacks The mid to late 2010s saw ransomware attacks on more prominent organizations and critical infrastructures. The most infamous of these early ransomware attacks was the attack on Los Angeles, California’s Hollywood Presbyterian Medical Center (Medical Center) in 2016. As with most ransomware victims, Medical Center saw their files encrypted, and they could not access them (Moran et al., 2021). The attack perpetrators demanded $17,000 in Bitcoin for access to a key to decrypt the unusable files. Due to the relatively small ransom price, Medical Center did pay out the amount required for the decryption key. The damage to their reputation and the money spent to upgrade their infrastructure was much more significant (Moran et al., 2021). Since then, ransomware has become much more sophisticated, and the amounts demanded as ransom has increased significantly. The cost incurred and damage caused by these early ransomware attacks pale compared to the more recent attacks of the 2020s. The Conti ransomware gang’s attacks, in particular, cause much more financial and reputational damage than the early Medical Center attack. As with the Medical Center attack, Conti is willing to attack hospitals, healthcare systems, and other critical infrastructure institutions. The outages caused by Conti’s attacks have dire consequences and can result in loss of life if essential systems such as medical services or dispatch carriers are affected (Hickman, 2021). During the beginning and height of the COVID-19 pandemic, news and media outlets widely reported the pandemic and its international effects. This widespread and constant 12 awareness of the disease exposed the public to a new outbreak of cybercrimes. Many searched online for additional information on COVID-19 and how they could best protect themselves and their families (Minnaar & Herbig, 2021). Cybercriminals used this desperate time to exploit a vulnerable public. Cybercriminals used the pandemic as a basis for new phishing campaigns. These emails contained topics related to the COVID outbreak. Still, they included malicious links that could, for example, direct a user to a spoofed website where the user might provide login information (Minnaar & Herbig, 2021). This login information would then get transmitted to the attacker who sent the phishing email. The use of COVID-19 to exploit the public also extended to cybercriminals seeking larger targets. Hospitals and healthcare facilities are massive targets, generally some of the most unsecured critical infrastructure sectors. The pandemic also saw these institutions increasingly becoming targeted by cybercriminals (Minnaar & Herbig, 2021). The Healthcare Service Executive Attack Conti’s attack on Ireland’s Health Service Executive (HSE) represents the worst ransomware attack against hospitals and healthcare systems. The HSE is a significant public organization that provides all the public health services to hospitals and communities for nearly 4,000 locations and 54 hospitals across Ireland. The public services impacted by the HSE are essential services throughout the hospital system, including the national ambulance service (PWC, 2021). Additionally, the HSE is also the largest organization in Ireland, employing a staff of more than 130,000 employees. For these reasons, the HSE is considered part of Ireland’s critical infrastructure by the European Union Network and Information Security Directive (PWC, 2021). 13 Conti gained initial access to the HSE network through an application or software with access to the internet. Conti exploited this internet-accessible application by sending phishing emails containing an attached document with malicious macros (Moran Stritch, 2021). Once the macro executes, the victim connects to the attacker’s command-and-control server to wait for further instructions. Conti then began using the infected system to infect other systems in the HSE network (Moran Stritch, 2021). After Conti obtained access to Ireland’s HSE IT environment, the attackers remained undetected for eight weeks. During these eight weeks, they began compromising a massive quantity of accounts and escalating their privileges for administrative actions (PWC, 2021). The attackers also compromised several servers and exfiltrated confidential data from hospitals within the HSE. At the end of those eight weeks (May 14, 2021), the attacker sent and detonated the Conti ransomware (PWC, 2021). The ransomware’s detonation caused an instant outage in HSE’s clinical and non-clinical systems. The outages caused by the ransomware attack also included communication channels, connected phone lines, and email communications. The Conti attack sought to disrupt Ireland’s hospital and healthcare systems, steal confidential and patient data, and demand a ransom to access and retrieve the data (PWC, 2021). HSE refused to pay the ransoms and sought out PricewaterhouseCoopers (PWC) to remediate the attack. On September 9, 2021, PWC decrypted all the affected servers and restored all applications (PWC, 2021). Although the HSE attack represents one of Conti’s most brazen attacks for ransom against the healthcare industry, not all of Conti’s attacks is against hospitals. 14 The Costa Rica attack The Conti attack on the Costa Rican government showcases the ransomware group’s willingness to attack nation-states. The Conti ransomware gang began to attack Costa Rica’s governing bodies in the week of April 10, 2022. During this time, Conti targeted 27 agencies, including the Ministry of Finance, with systems responsible for digital tax services and customs control (Burgess, 2022b). The attack crippled the country and halted intranational trade, causing the Costa Rican government to lose millions of dollars. Private businesses also faced a loss in revenue from the Conti attack. Reports from local businesses state that the disruption caused significant losses to imports and exports, with an estimated “$38 million per day up to $125 million over 48 hours” (Burgess, 2022b, para 8). Costa Rica’s President Chaves declared war against the Conti ransomware gang for their persistent attacks against the Costa Rican government. Conti’s attacks against the country are blatant, and the group publicly stated that they intend to “overthrow the government utilizing a cyberattack” (Faife, 2022, para. 4). Conti posted messages on their website advocating for Costa Ricans to compel their government into paying Conti’s demands. However, President Chaves’ refusal has caused these ransom demands made by Conti to have also doubled from the original $10 million to $20 million in payment (Faife, 2022). On May 31, 2022, a second attack against Costa Rica occurred. Although, the perpetrators of this attack appeared to use the HIVE ransomware rather than Conti. There are links to the HIVE ransomware and the Conti family, leading security experts to believe the attack is by the same group (Burgess, 2022b). The Conti ransomware gang may have also shut down servers and chat portals because of their recent show of support for the Russian invasion of Ukraine in February 2022. Conti’s support backfired as their publicly stated allegiance made 15 them unable to collect demanded ransom payments (Krebs, 2022b). Their allegiances now mean that victims who pay the ransom could mean they would violate the United States economic sanctions on Russia. Advanced Intel also learned through leaks in Conti’s internal communications that payment is not the goal of the Costa Rica attack. Instead, Advanced Intel claims that Conti is using the attack to create the illusion of Conti as the world’s greatest ransomware gang when, in reality, they are currently dismantling themselves (Krebs, 2022b). Understanding the Cyber Kill Chain Before examining Conti’s typical operations, it is important to understand that cyberattacks will generally follow the same sequence of events, culminating with the attackers causing harm to the victimized party. In 2011, Lockheed Martin developed the Cyber Kill Chain (kill chain) model to understand an attacker’s process. Although there are proposals to improve the model by adding and removing some kill chain model stages, the model remains unchanged (Villalon-Huerta et al., 2022). The kill chain addresses the problems discovered and methods utilized by specific Advanced Persistent Threats (APTs). Through understanding an APT through the kill chain, security professionals can create models of the attack stages against critical infrastructures and organizations (Villalon-Huerta et al., 2022). 16 Figure 1 Lockheed Martin Cyber Kill Chain Model Note. The seven stages of the cyber kill chain model. Lockheed Martin, n.d., (https://www.lockheedmartin.com/en-us/capabilities/cyber/cyber-kill-chain.html) The first stage of the kill chain is reconnaissance. The reconnaissance stage involves the attacker identifying their target and researching how to attack them best. The second stage is weaponization, which consists of creating the malicious payload deployed to its target (Villalon- 17 Huerta et al., 2022). Stage three is delivery and is the method and how the payload gets delivered to the targeted system. In the exploitation stage, stage four, the delivered payload gets executed on the victim’s machine. The next stage (stage five) is installation and involves the creation of backdoors or some other malicious software used in stage six (Villalon-Huerta et al., 2022). Next, at the command-and-control stage, the victimized system connects back to the attacker’s command server to wait and listen for further actions. Lastly, at stage seven, the attacker commences their actions on objectives to accomplish their objectives. In the case of the Conti gang, their actions are to typically steal confidential data and execute the Conti ransomware (Villalon-Huerta et al., 2022). Ransomware Infection Like all forms of malware, the Conti ransomware can only execute after being installed on an infected machine. Conti uses several methods to install itself on a previously uncompromised machine. Remote Desktop Protocol (RDP) is one such attack vector that the Conti gang or affiliates can exploit. Attackers may also attempt to exploit known vulnerabilities in Microsoft Exchange, firewalls, or, more recently, the Apache Log4j vulnerability (Kasiviswanathan & Kamble, 2022). Most Conti attacks include coordinated spear-phishing campaigns with separate malware strains. For example, phishing emails containing links to Google Drive with malicious payloads cause the infected device to reach out to domains hosted by malware strains such as Qakbot or Emotet. Some cases of Conti infection have also seen attackers use the malware to install the Cobalt Strike command-and-control framework. Cobalt Strike further compromises a network via lateral movement by pivoting to other systems on the network (Kasiviswanathan & Kamble, 2022). Regardless of the method used to infect a machine, the Conti ransomware gets deployed to all affected devices for execution. 18 Conti Email Phishing The Conti ransomware gang and affiliates initially get access to targeted environments via email phishing. This technique involves the attacker sending malicious emails to the targeted organization’s employees. Attackers design these emails so the recipient is goaded into opening or downloading the email’s contents. The email will contain a document or attachment with some method of contacting and downloading malware from the internet. Cybercriminals use email phishing attacks so frequently that the security researcher Calvin Nobles, a fellow at New America’s Cyber Security Initiative, studied how often human error caused a breach. Nobles’ study discovered that human error, including malicious emails, is responsible for roughly 90% of cyber security incidents (Kemper, 2019). Conti operates with other forms of malware and groups like Trickbot and Emotet. Emotet attacks function as malicious email spam sent to many recipients with the hope of someone executing the malware within the email. The Conti gang and affiliates use Emotet’s widespread phishing attacks and malicious spam services to obtain a foothold in a victim’s network or device (Intel 471, 2022). After an infected user, Emotet lists the organization as a target in a pool of potential ransomware targets. For a fee, a ransomware operator can choose their next victim with detailed information regarding the infected system extracted by Emotet (Intel 471, 2022). However, Conti attacks have begun shifting more towards the Trickbot gang (Trickbot) to aid in their initial network compromise. Trickbot operates the same way as Emotet, acting as an initial staging malware used to download and install the secondary payload of the Conti ransomware (Rochberger, 2021). 19 Privilege Escalation A device infected with one of Trickbot or Emotet’s staging malware will usually begin downloading a malicious file to provide the attacker access to the infected device. After the file gets executed, it will cause the device to reach out to a command-and-control server, typically Cobalt Strike, through the TLSv1 protocol (Umar et al., 2021). Once connected, the infected device involves malicious data transfers to and from the Conti command-and-control server and privilege escalation. This covert data transfer also shows that the device in question is infected with some form of malware and is possibly exfiltrating data to a malicious actor (Umar et al., 2021). Once the transfer completes, malware will attempt to spread throughout the network laterally through various methods such as SMB (Umar et al., 2021). The Conti leaks explain how Conti searches an infected network for privileged access. Conti attackers use several Windows native commands (such as Net) and enumeration tools (such as ADFind) to access an organization’s Active Directory to gather a list of the organization’s users. Active Directory is an identity store of usernames and passwords for all employees that log into the organization’s network (Largent, 2022). In addition, Conti actors will also use Open-Source Intelligence (OSINT) methods such as social media sites to discover employees and their roles to exploit them for privileged access. Unfortunately, the leaks also state that this practice of OSINT is much easier for organizations based in the US and EU due to how often roles and responsibilities get described in job postings (Largent, 2022). Conti’s primary focus when attempting to escalate privileges is discovering the domain admin credentials. These credentials would allow Conti complete and unfettered access to the entire network (Trend Micro, 2021). 20 Ransomware Execution From January to March 2022, the Conti ransomware gang had the source code of its malware leaked (Cisco Talos, 2022). The leaks can provide more insight into how the malware operates, and malware analysts can create additional indicators of attack for the Conti ransomware. However, these leaks can make it more difficult to attribute attacks to the Conti gang (Cisco Talos, 2022). In addition, other malicious actors may use the leaked source code to modify the Conti ransomware or attack businesses using methods not usually observed in Conti attacks. The most recent strain of the Conti ransomware is more dangerous and has increased capabilities compared to its predecessors. The Conti ransomware version 3 gets downloaded as an independent executable that acts as a loader and a dynamic linked library (DLL) (Rochberger, 2021). The significance of the Conti ransomware contained to a singular executable is that the ransomware can reference itself during its execution. By doing so, the ransomware includes processes that the victim’s system may not have. The Conti ransomware can also spawn up to 32 independent threads for concurrent file encryption on its target (Baskin, 2020). After sufficient files get transferred to Conti or their affiliates, the ransomware operators will download and execute the Conti ransomware. The Conti ransomware is unique when compared to other ransomware families. Ransomware operators connected to the command-andcontrol server can scan the entire network for specific data. Operators can also make the ransomware skip encryption of files stored locally on an infected machine and target networked SMB shares instead. Additionally, the ransomware can target specific IP addresses inputted by the operator, allowing them even more control over what is encrypted (Baskin, 2020). 21 File Encryption Asymmetric encryption involves using a public and a private key for either encryption or decryption of a file. Each of the encryption keys gets used once. The public key is typically freely available, allowing the recipient to send their public key to the sender. The sender will then encrypt the necessary file using the recipient’s public key and send the newly encrypted file to the recipient. Once the recipient receives the encrypted file, they will use their private key to decrypt it, revealing the file’s contents. The private key remains with the recipient and is not freely available for others to retrieve, decreasing the likelihood of outside parties decrypting the files (Rajneesh, 2018). Although the public key encryption method is a secure approach to sending and receiving files, ransomware uses the public key encryption architecture for malicious purposes. Conti has continually been under development, with new features and obfuscation techniques integrated nearly weekly (CrowdStrike Intel Team, 2022). An example of how Conti’s methods have evolved is how they changed their methods for encryption. Originally Conti encrypted victims’ files with AES-256. In August 2020, Conti changed their encryption methods to be more efficient by instead encrypting files with the ChaCha stream cipher (CrowdStrike Intel Team, 2022). The Conti ransomware can spawn up to 32 independent threads for concurrent file encryption on its target. The increased threads contribute to the ransomware having a much faster file encryption speed when compared to other ransomware families. Once executed, the ransomware will attempt to stop all services and prevent system recovery on the infected system. The Conti ransomware accomplishes this by using VSSadmin commands to delete shadows and resize shadow storage on the system drives. Once the victim has their services stopped and 22 cannot perform a system recovery, the ransomware begins encrypting all files on a system except for files that have the .exe, .dll, .lnk, or .sys extension (Baskin, 2020). During the encryption process, encrypted files change to have a “.CONTI” file extension. The resulting file is unusable without the proper decryption key, causing greater disruptions to the victim’s system the more files are encrypted. Throughout the ransomware’s iteration of a system and file encryption, the ransom note gets generated in each folder with encrypted files (Baskin, 2020). The ransom note informs the victim that their systems are infected, and files get encrypted with the Conti ransomware. The ransom note goes into further detail, stating that the victim should contact them through an email provided in the note. The ransom letter then lists sites where the victim can download and install the onion router (Tor) and their communication site. The last information included in the ransom note is that Conti will publish the victim’s stolen data if their demands are unmet (Rochberger, 2021). Ransomware Extortion After the ransomware on an infected machine encrypts the machine’s files, the next phase is to extort money from the machine’s owner. Ransom notes are usually threatening letters and may include a countdown timer and the amount requested as ransom in USD or some form of cryptocurrency. Payment addresses included in ransom notes are Bitcoin wallet addresses or websites created by affiliates (Conti et al., 2018). Ransom notes will also include details on how a victim can purchase Bitcoin or other cryptocurrencies if requested as a ransom. Once the victim pays the demanded ransom and the attacker confirms it, either the ransomware begins decryption of the encrypted files or the victim is directed to a site to download a decryption tool (Conti et al., 2018). 23 The RaaS model has evolved to include the double extortion technique to further force victims into paying more money. Although the process of demanding money from a ransomware attack is a form of extortion, double extortion seeks to gain additional compensation through threats to distribute data (Microsoft Security, 2022). Conti also uses the double extortion technique when performing attacks against organizations. Conti will steal the data from the targeted organization during their network exploration and before they execute the ransomware. Conti then threatens to publish this stolen information to extort more from the victim organization (Rochberger, 2021). Ransom Negotiations Once the execution of the Conti malware has occurred, and the infected system’s files are encrypted, Conti operators begin communication with the victimized party. Recorded communication by the ransomware operators during their extortion process revealed patterns in how they attempted to negotiate the amount ransomed (McKay et al., 2022). The operators communicate professionally using what seems to be a scripted introduction at the start of their communications. They also employ unemotional and straightforward messages to the victim to avoid deviating the conversation from the ransom they want to receive. Conti operators attempt to convince their victims to pay these ransoms immediately or suffer consequences that the operator state will happen (McKay et al., 2022). Conti’s promises to restore or decrypt files after a ransom payment are not always true. Palo Alto’s Unit 42 is a cyber security threat intelligence team that researches and publishes information on adversaries like Conti. A client of Unit 42 could only decrypt a small percentage of their files after paying Conti’s demands. With the few files restored, the Conti negotiators retreated into the dark web (Hickman, 2021). A separate Unit 42 client reported that they sought 24 an inventory of all compromised files from Conti to notify the parties and individuals of the breach. Conti agreed to provide the client with this information once the client paid the ransom. However, the inventory list did not get sent to the client. The Conti representatives refused, insisting that they did not have the requested data anymore and that there was no way of restoring it (Hickman, 2021). Attacks perpetrated by Conti can result in significant financial loss and loss of confidence in the victimized organization. Conti uses a multistage approach during engagements that typically starts with an initial compromise through malicious emails. Once the target is compromised, Conti searches for more vulnerable devices. Next, Conti attacks will usually result in the unleashing of the Conti ransomware and confidential data exfiltrated from the organization. Lastly, Conti pressures the victim into paying a ransom to decrypt the Conti ransomware and to have their stolen data returned without getting published (Rochberger, 2021). Discussion of the Findings The purpose of this research project was to provide a threat assessment of the Conti ransomware gang by uncovering the group’s motivations and methods used to distribute the malware and extort their victims. This paper examines why Conti targets companies, critical infrastructure, and government entities without regard to consequences. Because Conti is willing to attack various organizations, it is also important to understand how Conti and its affiliates perpetrate their attacks. By knowing how Conti begins their attack and what its ransomware does after execution, security professionals can create detections for Conti’s indicators of attack. The research utilized for this project intended to answer three specific questions. 25 Conti’s Motivations The first question that this research paper sought to answer is, “How is the Conti ransomware gang a threat to global organizations?” This question is important because it can explain who Conti targets and why. Conti does not typically discriminate in its targets, but there are industries and geographic locations that Conti attacks at an increased frequency. Cybersecurity professionals can use this research to discover if they are a prime target for Conti, adjust their defenses, and prepare for potential Conti attacks. Conti is a ransomware gang willing to target any organization or governmental agency for the opportunity of a large payout. With ransom demands topping $25 million, it is evident that Conti is extremely financially motivated. Examining Conti’s targets also proves Conti’s financial motivation. Conti typically targets high-value agencies and businesses that can provide large payouts if successfully compromised. One high-value sector that Conti consistently targets is hospitals and the healthcare industry. Medical data and personal information are valuable commodities easily sold on the darknet. Conti also extensively targets hospitals due to their usual lack of adequate security systems and awareness training. The COVID-19 pandemic thrust hospitals into the spotlight and became some of the most targeted organizations. Therefore, Conti views hospitals as an efficient method in its cost-benefit analysis in choosing their next targets. In 2022, Conti revealed that their motivations also align with the Russian government in addition to being financially motivated. Ransomware attacks emanating from Russia have a history of being overlooked by the Russian government. Ransomware strains from Russia also avoid execution on Russian-speaking systems. The Conti ransomware also follows the example of originating from Russia and halting execution on Russian-speaking devices. Furthermore, Conti’s vocal support of Russia’s invasion of Ukraine shows further evidence that Conti is allied 26 with the Russian government. Conti’s statement of support came from the assertion that they would attack any individual targeting Russia. The chat logs obtained by Advanced Intel also show the closeness and communications between Conti and the Russian State. Conti’s alignment with the Russian government may indicate some overlap with its members and Russian government employees. However, Conti’s support has also made it more difficult for them to extort ransom payments. Although, the members of Conti found a way to circumvent their new label as nationstate actors by rebranding as a new ransomware gang. Shortly after Conti announced support for Russia’s Ukraine invasion, many of their affiliates expressed their opposition to the statement. That opposition resulted in leaks that uncovered some of Conti’s techniques and organizational structure. Conti’s support made them appear as a nation-state hacker group, causing victims that pay ransoms to violate economic sanctions. The possibility of violating sanctions led to Conti victims seeking advice and getting told to refuse payment of Conti’s demands. Conti is rebranding as Hive to avoid the issues their support has caused. Even though the group’s name changes, the impact of their attacks remains the same. Impact of Conti Attacks This research paper sought to answer the second question: “What attacks are the Conti ransomware gang and affiliates responsible for, and what have been their outcomes?” The impact and damage caused by a successful Conti attack provide insight into how disruptive and destructive Conti is. Cybersecurity professionals can use this research to understand the potential damage caused by the successful execution of the Conti ransomware. The answers obtained from the second question will also give cybersecurity professionals insight into the aftermath of a Conti attack. 27 Conti is motivated by greed and possibly the Russian government; the resulting impact of a Conti attack is immense. During a Conti attack, the group usually first attempts to compromise the victim network through a coordinated phishing email campaign. Once an employee opens and executes the contents of the email, Conti gains access to the network through command-andcontrol servers. During this phase of a Conti attack, Conti searches the victim’s network to escalate their credentials to domain administrator privileges. Conti also uses this time to discover confidential information and trade secrets to steal from the network. Privilege escalation is vital for Conti because domain administrator privileges allow Conti full access to the network. The access granted by domain administrator credentials also gives Conti the ability to leave the Conti ransomware on various systems on the network. Conti gains access to more systems so they can compromise and encrypt more files. As the number of encrypted files grows, the targeted organization will face even greater disruptions. Ireland’s HSE attack shows the disruptions caused after the Conti ransomware executes. Conti had enough time in HSE’s network to obtain entry to several other departments and locations throughout the HSE network. The Conti ransomware effectively shut down the HSE after execution. Conti forced the HSE to revert to pen and paper for patient treatment and routine office work until the critical application backups got restored. However, it still took months for the HSE to restore backups and recover from the attack. Conti’s attack on the Costa Rican government is another example of how disruptive the Conti ransomware is after execution. While there are no clear motivations behind Conti’s attack on Costa Rica, the attack caused significant damage to the government. Costa Rican government employees likely fell victim to a phishing campaign like the HSE attack. After that, Conti connected government systems to command-and-control servers to search and spread throughout 28 the network. As a result, Conti compromised 27 government agencies and crippled the entire government and private companies, causing trade and tax stoppages that cost the country millions of dollars. There are far-reaching consequences of the attack not yet understood. The attack illustrates how important it is for security professionals to understand how to mitigate and prevent Conti attacks. Conti’s Attack Patterns The final question researched is “What are Conti’s techniques, tactics, and procedures (TTPs) throughout the Conti ransomware’s execution?” Conti regularly uses other malware groups for their malicious spam email operations to gain initial footholds on victim networks. These phishing emails usually have links to Google Drive hosting the malicious payload. Once the victim selects the link and reaches the Drive, the payload gets downloaded and executed on the victim’s machine. Intel 471 discovered that phishing attacks carried out by other malware groups are the most common way that Conti achieves access. Trickbot and Emotet are prime examples of malware groups that Conti utilizes for their initial access. By leveraging other malware groups, Conti can focus most of its time and resources on updating the Conti ransomware and discovering new attack vectors. Chris Krebs’ research found that Conti employs a research and development department within its organizational hierarchy. By using the existing spam email architecture of other malware groups, Conti can allocate more funds to further research of the Conti ransomware. The latest version of the Conti ransomware contains 32 independent threads dedicated to encrypting files on the victim’s machine. The number of threads responsible for encrypting files causes the Conti ransomware to encrypt files at a greater speed when compared to most ransomware families. The Conti ransomware or its 29 successors can become even quicker at encrypting files if Conti puts enough time and resources into developing its next ransomware update. Once Conti enters a victim’s network, it can remain hidden for months before the Conti ransomware detonates. Conti uses the time it is undercover to navigate the network to comprise other devices and locate valuable data. Conti also uses tools like Net and ADFind to aid in its search for employee credentials. The tools that Conti uses to discover an organization’s users are helpful, but OSINT is likely the easiest way for Conti to discover employees and their titles. Employees that post on social media open themselves up to compromise and widen their organization’s attack surface. The longer Conti persists in a victim’s network, the greater the damage they can cause. Conti has greater chances of compromising additional devices the longer it waits in a victim’s network. The HSE attack shows how long Conti is willing to remain hidden while searching for other vulnerable devices. Conti hid in HSE’s network for eight weeks before they executed the Conti ransomware. While inside the network, Conti used lateral movements and privilege escalations to access most of the HSE. The damage caused by the HSE attack also highlights Conti’s callousness. Despite being Ireland’s largest public healthcare system, Conti is willing to shut it down for the chance of a large payout. Some organizations may first think that surrendering to Conti and giving in to their demands is the answer to obtaining the decryption key for the encrypted files and applications. Conti promises that victims who pay the ransom payments will have their files decrypted and their stolen data deleted before publication. However, even paying Conti’s ransom demands is not guaranteed to revert the disruption and damages caused by Conti’s attack. There are reported 30 cases of victims still unable to decrypt files encrypted by the Conti ransomware. During those cases, the decrypting key provided by Conti may not aid in recovering all the files encrypted. Additionally, organizations seeking inventory of the affected and compromised servers may not receive the requested information. Conti representatives and operators are not required to provide information, and it is not unusual for them to refuse these requests. Although, victims conceding to Conti’s demands may also become liable for legal actions. Conti’s statements of support for Russia’s invasion of Ukraine also show the dangers to victims that answer Conti’s demands. The Russian government harboring ransomware gangs like Conti has caused Russia to face global backlash. Conti’s declaration of support for Russia and refusal to attack Russian-speaking systems makes security experts believe that Conti is working under the influence of the Russian government. Culafi stated that ransom payments to Conti are potentially delivered to a sanctioned individual, making extortion payments a violation of sanctions against Russia. Therefore, victims of Conti may open themselves to legal issues if they do decide to pay Conti’s ransom rather than alerting law enforcement agencies. Recommendations While Conti primarily attacks large organizations and the healthcare sector, Conti will also target other industries. Because of this, it is essential for cybersecurity professionals of all industries to understand how to mitigate Conti attacks at the different stages of the cyber kill chain. For example, security professionals can mitigate successful Conti attacks before Conti has access to the targeted network via spam filters and employee training. Additionally, incorporating network monitors to analyze and block suspicious traffic in and out of an organization’s network can lessen the damages caused by a Conti attack. Lastly, some methods 31 can be used for data recovery and governmental programs to assist organizations that fall victim to a successful Conti attack. Because human error is the cause of most cyber security incidents, mitigation of Conti attacks should start with reducing the amount of human error. Spam email filters are a straightforward way to mitigate Conti and other malware campaigns. Because most Conti attacks rely on employees of the targeted organization to click and execute phishing emails, preventing the email from reaching its recipient is necessary to prevent a successful attack. Spam email filters can filter emails based on the sender’s email address. Spam filters can also stop emails in orchestrated phishing campaigns by blocking email addresses that send out many spam emails. Blocking these spam email addresses stops phishing campaigns before reaching the targeted network. In cases where only a few specific employees get targeted, spam filters may not block these phishing emails. Groups Conti utilizes for email phishing have specific email subjects they use to fool employees. These phishing emails include subject lines like invoices, shipping notices, and other financial information. Because emails with these and similar subject lines may be legitimate, blocking all emails with these subject lines may not be sustainable. Instead, emails with suspicious subject lines should get analyzed in a sandboxed environment to ensure that the email contents are legitimate before allowing the email to continue to its destination. Email filters cannot prevent all malicious emails from entering the network. There are other ways to mitigate a Conti attack. The best defense against network intrusions is proper employee awareness and training. Removing as much human error as possible is the best method to prevent cyber-attacks. The email phishing attacks employed by Conti require an employee to access the message or attachment for a successful compromise. Therefore, teaching employees 32 how to spot suspicious and phishing emails is an excellent way to mitigate initial Conti attacks. Employee phishing training can alert an organization’s cyber security team to a potential Conti campaign against their network. The cyber security team can further monitor emails and network analysis with that information to determine if Conti has already compromised their organization. Should Conti find its way into an organization’s network, there are a few methods the organization’s security team can take to prevent further spread and contain the intruder. If Conti manages to enter a secured network, its first task is to elevate its network privileges and infect other machines across the network. Conti uses several tools during their hunt for administrative access, such as Net and ADFind, along with social media sites like LinkedIn. These tools and OSINT allow Conti to quickly discover employees, email addresses, and usernames. In addition, social media sites like LinkedIn can be significant for Conti in verifying employee names and occupations. For example, Using ADFind, Conti can determine valid usernames for the first and last names of employees discovered through LinkedIn. Unfortunately, limiting employee access and censoring employee profiles on social media is not a viable mitigation action for most organizations. Instead, organizations should look to limit the amount of domain administrator accounts and separate privileged access through the separation of duties model. Under the separation of duties model, administrative privileges get granted to an employee’s role rather than the employee. Privileges are only granted based on the level of access and when necessary for the employee to perform their job. An example of the separation of duties is a marketing director given admin-level access to the marketing department but not having access to that organization’s engineering department. By separating access, Conti would face more difficulties when attempting to escalate their privileges within a network. The increased time taken will also 33 give an organization’s security team more time to discover the intrusion through network monitoring and loss prevention programs. Regardless of size, all organizations should incorporate network analysis and monitoring. Various software and hardware products give security teams the ability to analyze and monitor network traffic. The simplest of these tools are some forms of an accounting server and event logging software. Network traffic should get stored on an accounting server to record all data transmitted and received throughout the network. Once stored, the data would need to be analyzed using the event logging software to discover if any interactions recorded constitute a malicious event. If malicious traffic gets discovered, there should be an event logged for the security team to perform further investigations. Also, loss prevention software will alert security teams to potential data exfiltration. Loss prevention software creates events when data from specified locations get seen leaving the network. Because Conti spends weeks in a network during their privilege escalation and data discovery phase, there is still time for an attentive security team to discover Conti. Conti also uses double extortion by stealing data and threatening to publish it should further demands be unmet. Incorporating an accounting server, network monitoring, and loss prevention software will mitigate the damage done by Conti attacks after they enter an organization’s network. Although it is best to attempt to prevent Conti from entering an organization’s network, it is still possible for them to evade detection, exfiltrate data, and execute the Conti ransomware. There are still methods that an organization’s security team can take to mitigate the damage caused by the ransomware’s execution. Another simple and important security element that all organizations should incorporate is the use of regularly scheduled backups of critical systems and data. The Conti ransomware encrypts files on all infected systems, preventing those files and 34 applications from being usable. The useless files and applications will cause disruptions regardless of the targeted organization’s industry. Therefore, security teams should record the most critical applications and systems that have priority if they become encrypted and unusable. The list of backed-up applications will need to be protected because the backups can be as vulnerable to encryption as the original. An organization’s security teams should protect the scheduled backups from a Conti ransomware attack. Conti may be able to corrupt or encrypt the stored backups if backups are stored somewhere on the network. Because Conti spends time navigating through and learning the layout of an organization’s network, they may also discover the locations where backup files are stored. Conti will attempt to discover and use domain administrative credentials to gain unfettered access throughout the network. Domain-level access would allow Conti to access and damage or encrypt any backups that an organization creates. Therefore, in addition to creating backups at regularly scheduled intervals, the backups should also be stored offline to avoid data corruption or encryption. Future Research The findings in this research paper revealed much of Conti’s motives, structures, and TTPs. However, understanding the ChaCha cipher encryption procedure, the connection between Conti and HIVE, and Conti’s close ties to the Russian government are all future research that would benefit cyber security professionals in defending against Conti. The additional research is vital because of the global disruptions and damage caused by Conti since their sudden appearance a few years ago. The Conti gang disproportionately targets a substantial number of US-based businesses. Because of this, the Federal Bureau of Investigations (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA) issued a dedicated flash alert. Conti 35 also released some information about the organizations they have successfully attacked in their own CONTI news site accessible via the Dark Web. Their news site also confirms that they have hacked over 450 organizations (Cymru, 2021). The ChaCha cipher is the new encryption technique that Conti uses during the Conti ransomware’s execution. There is not much information on the ChaCha cipher besides that Conti switched from fully encrypting targeted files and applications with AES-256 to selectively choosing files with the ChaCha cipher. Future research on the ChaCha cipher could aid in understanding the speed of the Conti ransomware’s file encryption. The study would also help security professionals learn how to decrypt Conti ransomware encrypted files and applications. While understanding how to decode the ChaCha cipher can lead to the decryption of the Conti ransomware’s encrypted files, there is a possibility the ChaCha cipher will get dropped entirely. Conti is rebranding itself as a new ransomware gang and may discontinue using the ChaCha cipher. Although ransomware gangs will normally rename themselves if they gain too much attention, the Biden administration’s new reward program shows how important information on ransomware gangs is. The Administration’s recent $10 million bounties on ransomware gang information show that international attention for ransomware attacks is at its peak. Conti’s massive attacks led them to gain international notoriety and attention quickly. Conti is attempting to avoid international notoriety and punishment through their rebranding as a new ransomware gang. There is currently a strong connection between Conti and HIVE. Conti members may also leave to form or join other groups. Therefore, further research into discovering what Conti is becoming and if its members are still active as criminal hackers. Even if Conti completely 36 rebrands as a new ransomware gang, the new gang will likely have the protection of its originating country. The Biden administration’s effort to stop ransomware attacks also aims at Russia for its sheltering of ransomware gangs. Russia has a long history of harboring criminals seeking refuge from international law enforcement agencies. Russia rarely extradites these criminals, especially if they are wanted or guilty of cybercrimes. The members of Conti are also harbored by Russia and protected by Russian policies. Conti appears to be more vocal than the other ransomware gangs when discussing their support for Russia. For example, Conti announced their support for the Russian invasion of Ukraine and added that whoever seeks to retaliate against Russia will be hacked. Those are not statements common for ransomware gangs even if they do support a particular country, and some members of Conti may have closer ties to the Russian government than previously thought. Therefore, future research into understanding the relationship between Conti and the Russian government. The research would allow security professionals to understand better ransomware gangs emanating from Russia and the relationship between cybercriminal organizations and the Russian government. Conclusion The purpose of this research project was to provide a threat assessment of the Conti ransomware gang by uncovering the group’s motivations and methods used to distribute the malware and extort their victims. This paper examines why Conti targets companies, critical infrastructure, and government entities without regard to consequences. Because Conti is willing to attack various organizations, it is also important to understand how Conti and its affiliates perpetrate their attacks. By knowing how Conti begins their attack and what its ransomware does after execution, security professionals can create detections for Conti’s indicators of attack. 37 The Conti ransomware gang has remained a persistent threat, attacking over 400 organizations globally from the start of 2020 to May 2021. The ransomware gang also demands significant amounts in their ransoms, reaching $25 million in some instances. Security and malware analysts believe that the Conti ransomware gang is based in Russia and offers its services to paying affiliates. These affiliates then distribute the malware used for attempted ransomware attacks, with Conti receiving a portion of the paid ransom. Conti affiliates and members are almost always from Russia, Belarus, and Ukraine and show a high degree of Russian patriotism. Conti organizes itself in such a way that it resembles a legitimate organization. Conti has various business departments that range from mundane human resources to the malicious ransomware development department. Leaks from Conti chats show that some departments aim to create and remove command-and-control servers to aid coworkers in data exfiltration and Conti ransomware installation. Conti is rebranding itself as a new ransomware gang to evade sanctions and hide from international law enforcement. Conti is attempting to change into HIVE to continue its ransomware practices without the label of a nation-state actor and the sanctions associated with that distinction. There is evidence that Conti is heavily influenced by the Russian government, as seen in their firm support of the Russian Invasion of Ukraine. That statement of support makes Conti considered a nation-state actor to cyber security professionals. However, Conti is primarily motivated by greed, and they are willing to attack high-value and well-known companies to reach that goal. Hospitals are some of Conti’s most targeted industries because hospitals do not typically have adequate cyber security defenses, and hospital employees usually do not understand cyber security awareness. Hospitals can usually afford to pay the large ransoms 38 demanded, and they have an even greater desire to bring downed systems back online as quickly as possible. Hospitals also contain a massive amount of information valuable to the darknet, such as patient personal information and medical data. Conti steals a hospital’s confidential information and uses it to extort even more money from the victimized hospital, threatening to publish it if not paid. Conti’s attack against Ireland’s HSE is a prime example of how dangerous and malicious Conti is during their attacks. Ireland’s HSE is the healthcare system of Ireland, and most of Ireland’s hospitals are associated with the HSE. The HSE provides public health services to hospitals and communities throughout Ireland and is an essential part of Ireland’s public health services. Conti shut down most of Ireland’s HSE after concealing themselves in the HSE network for approximately eight weeks. After Conti detonated the ransomware, the HSE’s clinical and non-clinical systems got shut down immediately. Conti also stole a massive amount of confidential information from the HSE and required the HSE to pay an additional ransom to prevent the information from being distributed online. Conti’s attack against Costa Rica shows how Conti is willing to take extraordinary lengths to complete its objectives. Conti’s goal in attacking the Costa Rican government is not financial gain, unlike most of their other attacks. Instead, Conti likely attacked Costa Rica to aid in their rebranding into a separate ransomware gang. Evidence shared by Advanced Intel shows that Conti is in the process of dismantling its organization and transforming itself into a new ransomware gang. Other ransomware gangs have also perpetrated large-scale attacks before shutting themselves down to avoid punishment from law enforcement agencies. However, Conti’s brazen attack on Costa Rica is one of the most destructive attacks of a ransomware gang undergoing a rebrand. 39 Conti accomplished the Costa Rica attack and most of their other attacks similarly. Conti uses other malware gangs specializing in coordinated phishing email campaigns to gain their initial foothold on a victim’s network. Once Conti gains access to the network, they begin to explore the network and connected systems for credentials to escalate their privileges to the domain administrator. During Conti’s privilege escalation and network discovery, they also locate and steal confidential information for later use as double extortion. Conti then downloads and installs the Conti ransomware onto the infected systems and executes the ransomware. With the ransomware executed and files encrypted, Conti will reach out to the affected victim to demand a ransom to decrypt the files and stop the publication of the stolen data. Organizations at risk of Conti attacks can take precautions to defend themselves against the threat and mitigate the potential damages caused by a successful attack. The best method in repelling Conti is preventing them from ever entering in the first place. Conti regularly uses email phishing campaigns in their TTPs when attempting to breach an organization’s network. Incorporating some form of email spam filter and employee phishing awareness training can mitigate the chances of Conti compromising and gaining access to the network. If Conti obtains network access, security teams can lessen the damage done to their organization by tightening security within the network. The longer Conti is in a network attempting to compromise more machines, the greater the chance security teams can discover and contain them. Separating duties and limiting the number of individuals with administrative access will make it more difficult for Conti to escalate their privileges. Implementing loss prevention software to alert security teams of confidential data leaving the network can also help discover if Conti is in the network. Having regularly scheduled backups stored in a secure location will aid in bringing an organization back online if Conti manages to unleash their ransomware. Having backups stored in a secure location 40 will also aid in mitigating the likelihood of the backups becoming damaged or destroyed by Conti while they probe the network. Conti is one of the most infamous ransomware gangs with ransom demands in the millions, and they are a threat to organizations across the globe. Conti is a ransomware gang with allegiances to the Russian government that also shelters them from the global consequences they have incurred. Conti is willing to attack any public or private organization not allied with Russia, as seen with Ireland’s HSE attack. Conti accomplished this and their other attacks through coordinated email phishing for initial access to the victim’s network. Once inside, Conti searches for credentials to escalate their privileges, compromise more network-connected devices, and steal confidential data. Once Conti executes their ransomware, they reach out to their victim to extort a ransom to access encrypted files and not publish the stolen information. Their attacks and closeness with Russia have caused them to become considered a state-sponsored entity, which is the primary reason for their attack on the Costa Rican government. Conti is now attempting to rebrand as HIVE in the midst of dismantling itself to evade sanctions, preventing them from receiving ransoms. Conti will likely continue to use their TTPs once they have fully switched to HIVE. Understanding the Conti threat will help an organization prevent successful ransomware attacks. 41 References Baskin, B. (2020, July 8). TAU threat discovery: Conti ransomware. VMWare. https://blogs.vmware.com/security/2020/07/tau-threat-discovery-conti-ransomware.html Burgess, M. (2022a, March 18). Conti leaks reveal the ransomware group’s links to Russia. Wired UK. https://www.wired.co.uk/article/conti-ransomware-russia Burgess, M. (2022b, June 12). Conti’s attack against Costa Rica sparks a new ransomware era. Wired. https://www.wired.com/story/costa-rica-ransomware-conti/ Cisco Talos. (2022). Incident response threat summary for January – March 2022. Cisco Talos. https://www.talosintelligence.com/resources/428 Computer Fraud & Security. (2021). Infamous Emotet botnet taken down by law enforcement. Computer Fraud & Security, 2021(2), 1. https://doi.org/10.1016/s1361-3723(21)00012-9 CrowdStrike Intel Team. (2022, January 7). Wizard Spider modifies and expands toolset [adversary update]. Crowdstrike. https://www.crowdstrike.com/blog/wizard-spideradversary-update/ Culafi, A. (2022, May 23). AdvIntel: Conti rebranding as several new ransomware groups. SearchSecurity. https://www.techtarget.com/searchsecurity/news/252520573/AdvIntelConti-rebranding-as-several-new-ransomware-groups Cymru, T. (2021). Analyzing ransomware negotiations with Conti: An in-depth analysis. Team Cymru. https://team-cymru.com/wp-content/uploads/2021/10/Conti_Paper_1.pdf Europol. (2021). Internet organised crime threat assessment (IOCTA) 2021. https://www.europol.europa.eu/activities- services/main- reports/ internet-organisedcrime-threat-assessment-iocta-2021. 42 Fadilpasic, S. (2022, May 20). Conti ransomware group officially shuts down - but probably not for long. TechRadar. https://www.techradar.com/news/conti-ransomware-groupofficially-shuts-down-but-probably-not-for-long Faife, C. (2022, May 19). Costa Rican president says country is ‘at war’ with Conti ransomware group. The Verge. https://www.theverge.com/2022/5/18/23125958/costa-rica-presidentsays-country-at-war-conti-ransomware-cybercrime Freeze, C. (2022, March 26). Canadian hacker’s case offers insight into rise of ‘ransomware as a service’ in Russia. (Sebastien Vachon-Desjardins). Globe & Mail (Toronto, Canada), A17, 17. Hickman, R. (2021, June 18). Conti ransomware gang: An overview. Unit42. https://unit42.paloaltonetworks.com/conti-ransomware-gang/ Hull, G., John, H., & Arief, B. (2019). Ransomware deployment methods and analysis: Views from a predictive model and human responses. Crime Science, 8(1). https://link.gale.com/apps/doc/A573937206/AONE?u=nysl_ce_uticacol&sid=bookmarkAONE&xid=f90d23bd Intel 471. (2022, May 4). Conti and Emotet: A constantly destructive duo. Intel471. https://intel471.com/blog/conti-emotet-ransomware-conti-leaks Kasiviswanathan, K., & Kamble, V. (2022, April 28). Ransomware: How attackers are breaching corporate networks. Symantec Blogs. https://symantec-enterpriseblogs.security.com/blogs/threat-intelligence/ransomware-hive-conti-avoslocker Kemper, G. (2019). Improving employees’ cyber security awareness. Computer Fraud & Security, 2019(8). https://doi.org/10.1016/s1361-3723(19)30085-5 43 Krebs, B. (2021, August 5). Ransomware gangs and the name game distraction. Krebs On Security. https://krebsonsecurity.com/2021/08/ransomware-gangs-and-the-name-gamedistraction/ Krebs, B. (2022a, March 2). Conti ransomware group diaries, part II: The office. Krebs On Security. https://krebsonsecurity.com/2022/03/conti-ransomware-group-diaries-part-iithe-office/ Krebs, B. (2022b, May 31). Costa Rica may be pawn in Conti ransomware group’s bid to rebrand, evade sanctions. Krebs On Security. https://krebsonsecurity.com/2022/05/costarica-may-be-pawn-in-conti-ransomware-groups-bid-to-rebrand-evade-sanctions/ Landau, S. (2022, April 15). Conti ransomware gang has “employee of the month” program. CyberTalk. https://www.cybertalk.org/2022/04/14/conti-ransomware-gang-hasemployee-of-the-month-program/ Largent, W. (2022, May 25). Translated: Talos’ insights from the recently leaked Conti ransomware playbook. Talos Intelligence. https://blog.talosintelligence.com/2021/09/Conti-leak-translation.html McKay, K., Eubanks, P., & Filson, J. (2022, May 2). Conti and Hive ransomware operations: Leveraging victim chats for insights. Talos Intelligence. https://talosintelligence.com/resources/437 Meland, P. H., Bayoumy, Y. F. F., & Sindre, G. (2020, February 18). The ransomware-as-aservice economy within the darknet. Computers & Security, 92. https://doi.org/10.1016/j.cose.2020.101762 44 Minnaar, A., & Herbig, F. J. W. (2021). Cyberattacks and the cybercrime threat of ransomware to hospitals and healthcare services during the COVID-19 pandemic. Acta Criminologica: African Journal of Criminology & Victimology, 34(3), 155–185. https://doi.org/10.10520/ejc-crim_v34_n3_a10 Microsoft Security. (2022, May 9). Ransomware-as-a-service: Understanding the cybercrime gig economy and how to protect yourself. Microsoft Security Blog. https://www.microsoft.com/security/blog/2022/05/09/ransomware-as-a-serviceunderstanding-the-cybercrime-gig-economy-and-how-to-protect-yourself/ Moran Stritch, M., Winterburn, M., & Houghton, F. (2021). The Conti ransomware attack on healthcare in Ireland: Exploring the impacts of a cybersecurity breach from a nursing perspective. Canadian Journal of Nursing Informatics, 16(3-4). Nakashima, E. (2021, July 7). Pressure grows on Biden to curb ransomware attacks. Washington Post, https://link.gale.com/apps/doc/A667660786/ITOF?u=nysl_ce_uticacol&sid= oclc&xid=c7411ad3 Paquet-Clouston, M., Haslhofer, B., Dupont, B. 2019. Ransomware payments in the bitcoin ecosystem. Oxford University Press (OUP). https://doi.org/10.1093/cybsec/tyz003 PricewaterhouseCoopers. (2021, December). Conti cyber attack on the HSE: Independent post incident review. https://www.hse.ie/eng/services/publications/conti-cyber-attack-on-thehse-full-report.pdf Rajneesh G. (2018). Hands-on cybersecurity with blockchain: Implement DDoS protection, PKIbased identity, 2FA, and DNS security using blockchain. Packt Publishing. Rochberger, L. (2021, January 12). Cybereason vs. Conti ransomware. Cybereason. https://www.cybereason.com/blog/research/cybereason-vs.-conti-ransomware 45 Sanger, D. & Perlroth, N. (2021, July 8). Biden weighs response to ransomware attacks emanating from Russia. New York Times, July 8, 2021, p. A9(L). Gale Academic OneFile,https://link.gale.com/apps/doc/A667742113/AONE?u=nysl_ce_uticacol&sid=bo okmark-AONE&xid=db4fadc4 Trend Micro. (2021, December 1). Ransomware spotlight: Conti. Security News. https://www.trendmicro.com/vinfo/us/security/news/ransomware-spotlight/ransomwarespotlight-conti Umar, R., Riadi, I., & Kusuma, R. S. (2021). Analysis of Conti ransomware attack on computer network with live forensic method. IJID (International Journal on Informatics for Development), 10(1), 53-61. Utami, H. D. J. R. H., Arifudin, R., & Alamsyah, A. (2019). Security login system on mobile application with implementation of Advanced Encryption Standard (AES) using 3 keys variation 128-bit, 192-bit, and 256-bit. Scientific Journal of Informatics, 6(1), 34–44. https://doi.org/10.15294/sji.v6i1.17589 Van Praet, N. (2022, March 12). Ransomware gang Conti takes credit for Alouette smelter cyberattack. (Aluminerie Alouette Inc.). Globe & Mail (Toronto, Canada), B2, 2. https://www.theglobeandmail.com/business/article-ransomware-gang-conti-takes-creditfor-alouette-cyberattack/ Villalon-Huerta, A., Gisbert, H. M., & Ripoll-Ripoll, I. (2022). Soc critical path: A defensive kill chain model. Ieee Access, 10. https://doi.org/10.1109/ACCESS.2022.3145029 46 ProQuest Number: 29391647 INFORMATION TO ALL USERS The quality and completeness of this reproduction is dependent on the quality and completeness of the copy made available to ProQuest. Distributed by ProQuest LLC ( 2022 ). Copyright of the Dissertation is held by the Author unless otherwise noted. This work may be used in accordance with the terms of the Creative Commons license or other rights statement, as indicated in the copyright statement or in the metadata associated with this work. Unless otherwise specified in the copyright statement or the metadata, all rights are reserved by the copyright holder. This work is protected against unauthorized copying under Title 17, United States Code and other applicable copyright laws. Microform Edition where available © ProQuest LLC. No reproduction or digitization of the Microform Edition is authorized without permission of ProQuest LLC. ProQuest LLC 789 East Eisenhower Parkway P.O. Box 1346 Ann Arbor, MI 48106 - 1346 USA