• Tech News
  • Fintech
  • Startup
  • Games
  • Ar & Vr
  • Reviews
  • How To
  • More
    • Mobile Tech
    • Pc & Laptop
    • Security
What's Hot

Nothing Phone (4a) Pro review: Daringly different

March 19, 2026

9 Hidden iPhone Features You Should Be Using in 2026

March 18, 2026

4 Features That Make Your iPhone More Than an App Launcher

March 14, 2026
Facebook Twitter Instagram
  • Contact
  • Privacy Policy
  • Terms & Conditions
Facebook Twitter Instagram Pinterest VKontakte
Behind The ScreenBehind The Screen
  • Tech News
  • Fintech
  • Startup
  • Games
  • Ar & Vr
  • Reviews
  • How To
  • More
    • Mobile Tech
    • Pc & Laptop
    • Security
Behind The ScreenBehind The Screen
Home»Security»Former Conti ransomware gang members helped target Ukraine, Google says
Security

Former Conti ransomware gang members helped target Ukraine, Google says

September 7, 2022No Comments3 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr Email
A Russian-backed malware group is spoofing pro-Ukraine apps, Google finds
Share
Facebook Twitter LinkedIn Pinterest Email

A cybercriminal group containing former members of the infamous Conti ransomware gang is focusing on the Ukrainian authorities and European NGOs within the area, Google says.

The main points come from a new blog post from the Menace Evaluation Group (TAG), a group inside Google devoted to monitoring state-sponsored cyber exercise.

With the struggle in Ukraine having lasted greater than half a yr, cyber exercise together with hacktivism and digital warfare has been a relentless presence within the background. Now, TAG says that profit-seeking cybercriminals have gotten lively within the space in larger numbers.

From April by means of August 2022, TAG has been following “an rising variety of financially motivated risk actors focusing on Ukraine whose actions appear intently aligned with Russian government-backed attackers,” writes TAG’s Pierre-Marc Bureau. One in every of these state-backed actors has already been designated by CERT — Ukraine’s nationwide Laptop Emergency Response Crew — as UAC-0098. However new evaluation from TAG hyperlinks it to Conti: a prolific international ransomware gang that shut down the Costa Rican authorities with a cyberattack in Could.

“TAG assesses some members of UAC-0098 are former members of the Conti cybercrime group repurposing their strategies to focus on Ukraine”

“Primarily based on a number of indicators, TAG assesses some members of UAC-0098 are former members of the Conti cybercrime group repurposing their strategies to focus on Ukraine,” Bureau writes.

The group often known as UAC-0098 has beforehand used a banking Trojan often known as IcedID to hold out ransomware assaults, however Google’s safety researchers say it’s now shifting to campaigns which might be “each politically and financially motivated.” In line with TAG’s evaluation, the members of this group are utilizing their experience to behave as preliminary entry brokers — the hackers who first compromise a pc system after which dump entry to different actors who’re fascinated by exploiting the goal.

See also  Dark data: Managing the data you can’t see

Current campaigns noticed the group ship phishing emails to quite a lot of organizations within the Ukrainian hospitality trade purporting to be the Cyber Police of Ukraine or, in one other occasion, focusing on humanitarian NGOs in Italy with phishing emails despatched from the hacked electronic mail account of an Indian lodge chain.

Different phishing campaigns impersonated representatives of Starlink, the satellite tv for pc web system operated by Elon Musk’s SpaceX. These emails delivered hyperlinks to malware installers disguised as software program required to hook up with the web by means of Starlink’s methods.

The Conti-linked group additionally exploited the Follina vulnerability in Home windows methods shortly after it was first publicized in late Could of this yr. On this and different assaults, it’s not recognized precisely what actions UAC-0098 has taken after methods have been compromised, TAG says.

Total, the Google researchers level to “blurring strains between financially motivated and authorities backed teams in Japanese Europe,” an indicator of the way in which cyber risk actors typically adapt their actions to align with the geopolitical pursuits in a given area.

However it’s not at all times a method assured to win. At first of the Ukraine invasion, Conti paid the value for brazenly declaring assist for Russia when an nameless particular person leaked entry to over a yr’s price of the group’s inside chat logs.

Source link

Conti gang Google helped members ransomware target Ukraine
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Posts

Samsung Galaxy S26 Ultra vs Google Pixel 10 Pro XL: Which flagship phone is best?

February 25, 2026

I love the Google Pixel wristlet accessory – but it has a big problem

December 6, 2025

I hate to say it, but don’t buy the Google Pixelsnap Stand

October 23, 2025

Google Pixel Watch 4 review: Pebble perfection

October 17, 2025
Add A Comment

Comments are closed.

Editors Picks

Teenage Engineering’s Record Factory is a DIY musician’s dream

December 2, 2022

Lenovo IdeaPad Slim 3 Chromebook review

August 23, 2023

When All Else Fails, Pivot To Profits

September 18, 2022

Neobank Grasshopper raises $30.4 million for digital banking solutions

August 1, 2022

Subscribe to Updates

Get the latest news and Updates from Behind The Scene about Tech, Startup and more.

Top Post

Nothing Phone (4a) Pro review: Daringly different

9 Hidden iPhone Features You Should Be Using in 2026

4 Features That Make Your iPhone More Than an App Launcher

Behind The Screen
Facebook Twitter Instagram Pinterest Vimeo YouTube
  • Contact
  • Privacy Policy
  • Terms & Conditions
© 2026 behindthescreen.fr - All rights reserved.

Type above and press Enter to search. Press Esc to cancel.