caution

Ehemalige Mitglieder der Conti-Ransomware-Bande halfen bei der Bekämpfung der Ukraine, sagt Google

Teilen:

Ein Blog der Threat Analysis Group beschreibt die Taktiken eines mit Russland verbundenen Bedrohungsakteurs

A cybercriminal group containing former members of the notorious Conti ransomware gang is targeting the Ukrainian government and European NGOs in the region, Google says.

The details come from a new blog post from the Threat Analysis Group (TAG), a team within Google dedicated to tracking state-sponsored cyber activity.

With the war in Ukraine having lasted more than half a year, cyber activity including hacktivism und electronic warfare has been a constant presence in the background. Now, TAG says that profit-seeking cybercriminals are becoming active in the area in greater numbers.

From April through August 2022, TAG has been following “an increasing number of financially motivated threat actors targeting Ukraine whose activities seem closely aligned with Russian government-backed attackers,” writes TAG’s Pierre-Marc Bureau. One of these state-backed actors has already been designated by CERT — Ukraine’s national Computer Emergency Response Team — as UAC-0098. But new analysis from TAG links it to Conti: a prolific global ransomware gang that shut down the Costa Rican government with a cyberattack in May.

“TAG assesses some members of UAC-0098 are former members of the Conti cybercrime group repurposing their techniques to target Ukraine”

“Based on multiple indicators, TAG assesses some members of UAC-0098 are former members of the Conti cybercrime group repurposing their techniques to target Ukraine,” Bureau writes.

The group known as UAC-0098 has previously used a banking Trojan known as IcedID to carry out ransomware attacks, but Google’s security researchers say it is now shifting to campaigns that are “both politically and financially motivated.” According to TAG’s analysis, the members of this group are using their expertise to act as initial access brokers — the hackers who first compromise a computer system and then sell off access to other actors who are interested in exploiting the target.

Recent campaigns saw the group send phishing emails to a number of organizations in the Ukrainian hospitality industry purporting to be the Cyber Police of Ukraine or, in another instance, targeting humanitarian NGOs in Italy with phishing emails sent from the hacked email account of an Indian hotel chain.

Other phishing campaigns impersonated representatives of Starlink, the satellite internet system operated by Elon Musk’s SpaceX. These emails delivered links to malware installers disguised as software required to connect to the internet through Starlink’s systems.

The Conti-linked group also exploited the Follina vulnerability in Windows systems shortly after it was first publicized in late May of this year. In this and other attacks, it is not known exactly what actions UAC-0098 has taken after systems have been compromised, TAG says.

Overall, the Google researchers point to “blurring lines between financially motivated and government backed groups in Eastern Europe,” an indicator of the way cyber threat actors often adapt their activities to align with the geopolitical interests in a given region.

But it’s not always a strategy guaranteed to win. At the start of the Ukraine invasion, Conti paid the price for openly declaring support for Russia when an anonymous individual leaked access to over a year’s worth of the group’s internal chat logs.

https://www.theverge.com/2022/9/7/23341045/former-conti-ransomware-gang-target-ukraine-google

Kommentar verfassen

Deine E-Mail-Adresse wird nicht veröffentlicht. Erforderliche Felder sind mit * markiert

lade-bild
London, GB
7:57 pm, Mai 17, 2025
Wetter-Symbol 17°C
L: 17° | H: 18°
klarer Himmel
Luftfeuchtigkeit: 55 %
Druck: 1021 mb
Wind: 2 mph ENE
Windböe: 6 mph
UV-Index: 0
Niederschlag: 0 mm
Wolken: 0%
Regen Chance: 0%
Sichtbarkeit: 10 km
Sonnenaufgang: 5:05 am
Sonnenuntergang: 8:48 pm
TäglichStündlich
Tägliche VorhersageStündliche Vorhersage
Today 10:00 pm
Wetter-Symbol
17° | 18°°C 0 mm 0% 4 mph 59 % 1021 mb 0 mm/h
Tomorrow 10:00 pm
Wetter-Symbol
11° | 17°°C 0 mm 0% 8 mph 82 % 1021 mb 0 mm/h
Mo. Mai 19 10:00 pm
Wetter-Symbol
11° | 19°°C 0.2 mm 20% 13 mph 78 % 1022 mb 0 mm/h
Di. Mai 20 10:00 pm
Wetter-Symbol
9° | 21°°C 0.35 mm 35% 9 mph 81 % 1022 mb 0 mm/h
Mi. Mai 21 10:00 pm
Wetter-Symbol
11° | 20°°C 0.09 mm 9% 11 mph 79 % 1020 mb 0 mm/h
Today 10:00 pm
Wetter-Symbol
14° | 16°°C 0 mm 0% 4 mph 59 % 1021 mb 0 mm/h
Tomorrow 1:00 am
Wetter-Symbol
12° | 14°°C 0 mm 0% 4 mph 69 % 1021 mb 0 mm/h
Tomorrow 4:00 am
Wetter-Symbol
11° | 11°°C 0 mm 0% 6 mph 81 % 1021 mb 0 mm/h
Tomorrow 7:00 am
Wetter-Symbol
11° | 11°°C 0 mm 0% 8 mph 82 % 1021 mb 0 mm/h
Tomorrow 10:00 am
Wetter-Symbol
11° | 11°°C 0 mm 0% 8 mph 69 % 1021 mb 0 mm/h
Tomorrow 1:00 pm
Wetter-Symbol
14° | 14°°C 0 mm 0% 7 mph 53 % 1021 mb 0 mm/h
Tomorrow 4:00 pm
Wetter-Symbol
17° | 17°°C 0 mm 0% 8 mph 44 % 1019 mb 0 mm/h
Tomorrow 7:00 pm
Wetter-Symbol
16° | 16°°C 0 mm 0% 8 mph 53 % 1019 mb 0 mm/h
Name Preis24H (%)
Bitcoin(BTC)
€92,418.32
-0.67%
Ethereum(ETH)
€2,217.81
-4.25%
Fesseln(USDT)
€0.90
0.00%
XRP(XRP)
€2.10
-2.97%
Solana(SOL)
€149.16
-2.28%
USDC(USDC)
€0.90
0.00%
Dogecoin(DOGE)
€0.192625
-4.77%
Shiba Inu(SHIB)
€0.000013
-4.95%
Pepe(PEPE)
€0.000011
-8.41%
Peanut das Eichhörnchen(PNUT)
€0.268149
-10.94%
Nach oben scrollen