Site icon TheCyberThrone

Conti Ransomware Exploits Log4j

Advertisements

Conti ransomware gang leverages  Log4Shell  exploit to compromise VMware vCenter Server installs. The ransomware group used the exploit to target internal devices that are not protected.

Conti operators run a private Ransomware-as-a-Service (RaaS), the malware appeared in the threat landscape at the end of December 2019 and was distributed through TrickBot infections. Experts speculate the operators are members of a Russia-based cybercrime group known as Wizard Spider.

Advertisements

Recently the Conti gang hit the attack on the Australian energy CS Energy and threaten to leak the stolen files.

Conti ransomware gang started attempting to exploit the Log4Shell issue the day after the disclosure of the exploit. The gang and its affiliates started targeting VMware vCenter servers because the virtualization giant has yet to release a fix for the flaw.

LOG4j Affected Products

Exit mobile version