Advertisement
Canada markets closed
  • S&P/TSX

    21,953.80
    +78.01 (+0.36%)
     
  • S&P 500

    5,509.01
    +33.92 (+0.62%)
     
  • DOW

    39,331.85
    +162.33 (+0.41%)
     
  • CAD/USD

    0.7312
    +0.0029 (+0.39%)
     
  • CRUDE OIL

    83.17
    -0.21 (-0.25%)
     
  • Bitcoin CAD

    84,571.77
    -1,847.58 (-2.14%)
     
  • CMC Crypto 200

    1,332.23
    -12.28 (-0.91%)
     
  • GOLD FUTURES

    2,338.60
    -0.30 (-0.01%)
     
  • RUSSELL 2000

    2,033.87
    +3.81 (+0.19%)
     
  • 10-Yr Bond

    4.4360
    -0.0430 (-0.96%)
     
  • NASDAQ futures

    20,240.00
    +188.00 (+0.94%)
     
  • VOLATILITY

    12.03
    -0.19 (-1.55%)
     
  • FTSE

    8,121.20
    -45.56 (-0.56%)
     
  • NIKKEI 225

    40,074.69
    +443.63 (+1.12%)
     
  • CAD/EUR

    0.6801
    +0.0024 (+0.35%)
     

Ransomware Gang Conti Has Re-Surfaced and Now Operates as Three Groups: TRM Labs

Join the most important conversation in crypto and web3! Secure your seat today

The world of cybercrime saw some notable changes over the past year: new darknet marketplaces took the place of the shut down Hydra and operators of the notorious Conti ransomware group rebranded under new names, said the blockchain analytics firm TRM Labs.

In a new report analyzing the re-shaping of cybercrime industry since the beginning of the Russian war in Ukraine, TRM named alleged successors of Conti, a once-notorious ransomware gang that extorted hundreds of bitcoins from the U.S. corporations, including health-care organizations during the COVID-19 pandemic. According to TRM, Conti “rebranded into at least three smaller groups: Black Basta, BlackByte and Karakurt.”

Conti has been successfully attacking multiple organizations in the U.S. encrypting their IT systems and demanding large ransom to unlock the files. In 2022, the group pledged its allegiance to Russia in the recently started war in Ukraine. Soon after that, allegedly, an insider unhappy about the decision leaked gigabytes of the group members’ messages to each other, discussing the hacks, payouts, ways to cash out crypto and just their everyday life.

ADVERTISEMENT

But soon, either because of the leak of for some other reasons, Conti reportedly ceased operations. However, the hackers did not quit and the crypto wallets linked to Conti operators remained active and likely switched to other ransomware strains.

Read more: Ransomware Gang Extorted 725 BTC in One Attack, On-Chain Sleuths Find

In January, Chainalysis published a report saying that wallets of Conti’s alleged leader Stern “transacted with addresses linked to strains like Quantum, Karakurt, Diavol, and Royal in 2022 following Conti’s demise,” as ransomware operators are, apparently, usually work with multiple malware variants, simultaneously collaborating with a bunch of hacker collectives at once.

TRM says the main successor of Conti is most likely the ransomware group known as Karakurt. The link between the two was previously suggested by cybersecurity experts. According to a cybersecurity firm Avertium, Karakurt usually attacks organizations that have already been compromised before.

Just like Conti, Karakurt has been not above attacking health-care organizations, in particular a billing vendor Practice Resources, that’s been hit with an attack in August 2022. However, unlike Conti, Karakurt did not encrypt victims’ files but only stole them and threatened victims to leak it if a ransom wasn’t paid.

According TRM Labs, Karakurt has been active since at least October 2021. Both Conti and Karakurt used the same address to sent the ransomware payments they received in October 2021, TRM says, and later than address sent the money to a “high-risk exchange.”

“The timeline of Karakurt's off-chain and on-chain activity confirms that the group was active long prior to Conti's official shutdown that occurred in May 2023. Karakurt appears to have been set up by Conti in 2021 and became fully operational under its new brand in 2022,” TRM Labs head of legal and government affairs Ari Redbord told CoinDesk. He added that most likely, the same people were behind Conti and Karakurt.

As for cash-out methods for cybercriminals, darknet marketplaces, where anonymous vendors offer illegal drugs, fake documents and other shadow goods and services, are becoming a popular money laundering channel, TRM Labs said in the report. In a sense that these platforms merge together their users funds on centralized wallets, they serve partly as a kind of mixer, the reports said.

This money laundering option has been attracting even more cybercriminals recently, in particular, those that profit from the child sexual abuse materials (CSAM), or child pornography, TRM said. The firm registered an uptick of CSAM-related crypto inflows to Russia-associated darknet platforms, the report said.

The war could help that trend as Russia has become increasingly isolated from the West in the political and economical sense, TRM said. “It is possible that Russia’s political and economic estrangement from the West has fuelled perceptions that the country is a friendly jurisdiction for criminals seeking to evade Western law enforcement.” it added.