Security Market Segment LS
Wednesday, 17 February 2021 23:38

A three-part series on the realities of Conti ransomware from Sophos


New research from Sophos details the "day-by-day unfolding of a human-operated Conti attack using fileless ransomware", with background on the ransomware’s behaviours, and defender advice.

Cyber security company Sophos has published its new "three-part series on the realities of Conti ransomware", revealing what really happens when cyberattackers break into an organisation’s network, detailing how an attack unfolded over five days, its technical features and attack behaviours, and defender advice for IT admins, security researchers and security operations professionals.

Conti is a human-operated “double extortion” ransomware that steals and threatens to expose information as well as encrypting it.

Ransomware is one of the most prevalent threats to Australian organisations and individuals - and to everyone globally. Often seen as a technical issue, it’s easy to forget about the ‘human factor’ but behind the crime there is an individual or network of people driving the attack, so what does it look like behind the scenes?

We're told that the first article, “A Conti Ransomware Attack Day-by-Day”, presents "a timeline of an active Conti ransomware attack, from the initial compromise to the recovery of the target’s operations."

Naturally, Sophos explains that its Sophos Rapid Response team, which is a 24/7 incident response team, "neutralised, contained and investigated the attack."

The article also includes Indicators of Compromise (IoCs), and tactics, techniques and procedures (TTPs) to help defenders look for and prepare against future Conti attacks.

The second article is a technical one by the SophosLabs researchers, “Conti Ransomware: Evasive by Nature”, which we're told "shows how the attackers try to obstruct analysis of the ransomware by deploying legitimate Cobalt Strike beacons onto compromised machines and then loading code directly into memory during their attacks, leaving no artefacts for investigators to find and examine."

Peter Mackenzie, manager, Sophos Rapid Response said: “This was a very fast and potentially devastating attack.

“We discovered that the attackers managed to compromise the target’s network and gain access to domain admin credentials within 16 minutes of exploiting a vulnerable firewall. Within hours, the attackers were deploying Cobalt Strike beacons to servers that would form the backbone of the ransomware attack.

“In attacks where humans are at the controls, adversaries can adapt and react to changing situations in real time. In this case, the attackers had simultaneously gained access to two servers, so when the target detected and disabled one of these – and believed they’d stopped the attack in time – the attackers simply switched and continued their attack using the second server. Having a ‘Plan B’ is a common approach for human-led attacks and a reminder that just because some suspicious activity on the network has stopped, it doesn’t mean the attack is over.

“After exfiltrating data, the attackers deployed Cobalt Strike beacons to nearly 300 devices and launched the ransomware. The target was left with little choice but to shut down critical infrastructure and work operations. The target then contacted Sophos, and we were able to start neutralising and containing the attack within 45 minutes. Within a day, the target was able to recover unprotected affected computers and resume operations,” continued Mackenzie.

The "Conti News" site, which is a site we won't link to (as it could well be infected if it is even still up) is from Conti's creators, and it has published data stolen from at least 180 victims to date, with two diagrams of information provided from that site created by Sophos embedded below. 

This article continues after these two images, with the third in the Sophos series entitled "What to expect when you've been hit with Conti ransomware" - please read on!

The third article is entitled: “What to Expect When You’ve Been Hit with Conti Ransomware", with Sophos stating that it "provides essential guidance for IT admins facing the impact of a Conti attack.

"The article covers what to do immediately and then provides a 12-point checklist to help IT admins investigate the attack. The checklist walks defenders through everything the Conti attackers could do while on the network and the primary TTPs they are likely to use. The article includes recommendations for action."

Mackenzie added: “In companies without access to a designated IT security team, it’s often IT admins who are in the direct line of fire for a ransomware attack.

“They’re the ones who come into work one morning to find everything locked and a threatening ransom note on the screen, sometimes followed by threatening emails and even phone calls. Based on our first-hand threat hunting experiences, we’ve developed an action list that will help IT admins get through the deeply challenging and stressful first few hours and days after a Conti ransomware attack, understand where they can get help, and lay the foundations for a more secure future.”

So, what is "Immediate Advice for Defenders" from Sophos? 

  • Shut down internet-facing remote desktop protocol (RDP) to deny cybercriminals access to networks
    If you need access to RDP, put it behind a VPN connection
  • Use layered security to prevent, protect and detect cyberattacks, including endpoint detection and response (EDR) capabilities and managed response teams who watch networks 24/7
  • Be aware of the five early indicators an attacker is present to stop ransomware attacks
  • Have an effective incident response plan in place and update it as needed. If you don’t feel confident you have the skills or resources in place to do this, to monitor threats or to respond to emergency incidents, consider turning to external experts for help 

Sophos says it "detects components of Conti under one or more of the following definitions: HPmal/Conti-B, Mem/Conti-B, or Mem/Meter-D", and says that "IoCs and the main TTPs for Conti ransomware and the attacks covered are posted on SophosLabs’ GitHub page."

Late last year, iTWire conducted a video interview with Aaron Bugal, the Global Cyber Security Solutions Enabler at Sophos, on the company's 2021 Threat report, which you can see here.

Read 2696 times

Please join our community here and become a VIP.

Subscribe to ITWIRE UPDATE Newsletter here
JOIN our iTWireTV our YouTube Community here


Thoughtworks presents XConf Australia, back in-person in three cities, bringing together people who care deeply about software and its impact on the world.

In its fifth year, XConf is our annual technology event created by technologists for technologists.

Participate in a robust agenda of talks as local thought leaders and Thoughtworks technologists share first-hand experiences and exchange new ways to empower teams, deliver quality software and drive innovation for responsible tech.

Explore how at Thoughtworks, we are making tech better, together.

Tickets are now available and all proceeds will be donated to Indigitek, a not-for-profit organisation that aims to create technology employment pathways for First Nations Peoples.

Click the button below to register and get your ticket for the Melbourne, Sydney or Brisbane event



It's all about Webinars.

Marketing budgets are now focused on Webinars combined with Lead Generation.

If you wish to promote a Webinar we recommend at least a 3 to 4 week campaign prior to your event.

The iTWire campaign will include extensive adverts on our News Site and prominent Newsletter promotion and Promotional News & Editorial. Plus a video interview of the key speaker on iTWire TV which will be used in Promotional Posts on the iTWire Home Page.

Now we are coming out of Lockdown iTWire will be focussed to assisting with your webinars and campaigns and assistance via part payments and extended terms, a Webinar Business Booster Pack and other supportive programs. We can also create your adverts and written content plus coordinate your video interview.

We look forward to discussing your campaign goals with you. Please click the button below.


Alex Zaharov-Reutt

Alex Zaharov-Reutt is iTWire's Technology Editor is one of Australia’s best-known technology journalists and consumer tech experts, Alex has appeared in his capacity as technology expert on all of Australia’s free-to-air and pay TV networks on all the major news and current affairs programs, on commercial and public radio, and technology, lifestyle and reality TV shows. Visit Alex at Twitter here.

Share News tips for the iTWire Journalists? Your tip will be anonymous




Guest Opinion

Guest Interviews

Guest Reviews

Guest Research

Guest Research & Case Studies

Channel News