Conti is a Russian-based ransomware group that operates a ransomware-as-a-service model to deploy the Conti ransomware. They are one of the more prolific ransomware groups in operation today. The FBI estimates that as of January 2022, there had been over 1,000 victims of attacks associated with Conti ransomware with victim payouts exceeding $150,000,000, making the Conti ransomware variant the costliest strain of ransomware ever documented.1 Although Conti focuses on the healthcare sector, Conti ransomware has also victimized organizations in the Energy, Food and Agriculture, Financial Services, and Information Technology sectors.
The worldwide impact of Conti is significant. So much in fact that the U.S. Department of State is offering rewards of up to $10 million for information that leads to the identification or location of any individual who holds a key leadership position in the Conti crime group. To learn more about Conti attacks, visit Data Breach Today’s website where more than 200 articles have been published.
Recently, Tenable has published the list of vulnerabilities used by Conti together with their Vulnerability Priority Rating (VPR) scores to understand the criticality of each vulnerability. Conti uses a variety of attack vectors including phishing, malware and attacks against Remote Desktop Protocol. Tenable lists 9 initial access vulnerabilities and 24 elevation of privilege vulnerabilities. Tenable will be releasing scan templates soon, and in the meantime, organizations can leverage their ContiLeaks Dashboards for Tenable.io and Tenable.sc to identify the known vulnerabilities exploited by the Conti ransomware group and its affiliates.
BigFix can quickly remediate 29 of the 33 vulnerabilities. BigFix Insights for Vulnerability Remediation enables IT Operations and Security teams to minimize the time and effort to identify and remediate vulnerabilities, creating an incredibly fast, powerful and effective solution for finding and remediating vulnerabilities that may lead to devastating cyberattacks.