Conti ransomware

Conti is a ransomware-as-a-service affiliate program associated with Russian threat actors. The developers of this ransomware sell or lease their ransomware technology to affiliates who use the technology to carry out attacks. The group also has a website on which they expose the sensitive documents from various attacks carried out on organizations in different sectors.

The group uses email phishing attacks to install TrickBot and BazaarLoader Trojans to gain remote access. The emails sent to victims are generally disguised as coming from trusted sources and point to a link that contains a malicious document. This document on Google Drive contains malicious payload and, once downloaded, a Bazaar backdoor malware that connects the device of the victim to Conti ransomware's server get downloaded as well.

Since the device is now compromised, Conti encrypts the data and demands a ransom in exchange for the decryption key. Conti targets medium to large-sized enterprises and the ransom amount depends on the organization's capacity to pay.

This video will cover how Conti ransomware works, evasion techniques, and how to remove Conti ransomware.

Watch the video to learn more!

  • &nsbp;

    Apache Log4j vulnerability

    Logging is a fundamental feature of software. A flaw in Log4j...

    3.00

     
  • &nsbp;

    US government probes...

    On April 29, 2022, the United States government...

    3.00

     
  • &nsbp;

    Qakbot malware

    First discovered in 2007, Qakbot is widespread malware used for stealing information...

    3.00

     
  • &nsbp;

    Emotet malware

    Originally developed as a banking trojan in 2014, Emotet malware was...

    3.00

     
  • &nsbp;

    Cobalt Strike

    Created in 2012 by Raphael Mudge, Cobalt Strike is a remote...

    3.00

     
  • &nsbp;

    Mimikatz

    Mimikatz is an open source application that allows users to view and save...

    3.00

     
  • &nsbp;

    REvil Ransomware

    Belonging to the Cryptomix ransomware family, Clop ransomware...

    3.00

     
  • &nsbp;

    TrickBot

    Originally designed by a group of sophisticated cybercriminals as a banking...

    3.00

     
  • &nsbp;

    Colonial Pipeline attack

    Colonial Pipeline, a jet fuel and gasoline provider for the eastern United...

    3.00

     
  • &nsbp;

    Clop ransomware

    A California-based information security and compliance firm, Qualys,...

    3.00

     
  • &nsbp;

    Mirai malware

    Mirai malware infects devices that run on the ARC processor, turning...

    3.00

     
  • &nsbp;

    IcedID Malware

    IcedID, aka BokBot, is a banking trojan-type malware that can be used...

    3.00

     
  • &nsbp;

    SocGholish

    SocGholish is an initial access threat that uses drive-by-downloads that...

    3.00

     
  • &nsbp;

    Agent Tesla

    First discovered in 2014, Agent Tesla is an advanced Remote Access...

    3.00

     
  • &nsbp;

    Shlayer Malware

    First discovered in 2018, Shlayer malware has become one of the most...

    3.00

     
  • &nsbp;

    Gameover Zeus

    Identified in September 2011, GameOver Zeus is a peer-to-peer (P2P) variant...

    3.00

     
  • &nsbp;

    LokiBot

    First discovered in 2016, LokiBot is infostealing malware that...

    3.00

     
  • &nsbp;

    NanoCore

    Sold in underground forums, the NanoCore remote access Trojan...

    3.00

     
  • &nsbp;

    Man-in-the-middle attacks

    Man-in-the-middle (MitM) attacks take place...

    3.00

     
  • &nsbp;

    GandCrab ransomware

    GandCrab ransomware encrypts victims files...

    3.00

     
  • &nsbp;

    FormBook malware

    FormBook is an infostealer malware that steals...

    3.00

     
  • &nsbp;

    Shamoon virus

    Shamoon is a dangerous malware program used in...

    3.00

     
  • &nsbp;

    Lapsus ransomware

    Lapsus is a hacking group that gained noto...

    3.00

     
  • &nsbp;

    njRAT trojan

    The njRAT, also known as Bladabindi, is...

    3.00

     
  • &nsbp;

    Phorpiex botnet

    The Phorpiex Botnet, initially a worm...

    3.00

     
  • &nsbp;

    HawkEye keylogger

    HawkEye keylogger is a formidable...

    3.00

     
  • &nsbp;

    Teslacrypt

    TeslaCrypt is a ransomware variant...

    3.00

     

Get the latest content delivered
right to your inbox!

Thank you for subscribing.

You will receive regular updates on the latest news on cybersecurity.

  • Please enter a business email id
  • US
  • By clicking on Keep me Updated you agree to processing of personal data according to the Privacy Policy.

© 2025 Zoho Corporation Pvt. Ltd. All rights reserved.

Back to Top