This story has been covered across cybersecurity media, but it’s so big I’m surprised it hasn’t been covered more by mainstream media. Earlier this year, a ransomware attack by the Conti ransomware group left the government in Costa Rica severely crippled – to the point that staff at affected organizations turned to pen and paper to get things done!
Gregory Bufithis sums up key points in an article on his terrific site here:
- Jorge Mora, Costa Rica’s digital governance chief, received a message in April from one of his officials: “We couldn’t contain it and they’ve encrypted the servers. We’ve disconnected the entire ministry.”
- He was being updated on a harrowing cyber-assault by a notorious Russian ransomware group called Conti, which started at the Central American country’s ministry of finance and eventually ensnared 27 different ministries in a series of interlinked attacks that unfurled over weeks.
- The attack was “impressive in its scope”, according to one western official. Usually, hackers manage to gain access to single systems but this case highlights the risk posed by weak cyber security to a nation’s entire IT infrastructure. In Costa Rica, Conti had spent weeks, if not months, of tunnelling around in its government systems, leaping from one ministry to the other.
- Conti offered to return the data: at a price of up to $20mn. But the Costa Rican government refused to pay the ransom. Instead, newly installed President Rodrigo Chaves declared a national emergency, launched a hunt for alleged “traitors” and leaned on tech savvier allies such as the US and Spain to come to its aid. “We are at war, and that is not an exaggeration,” Chaves said in the days after his inauguration in mid-May, blaming the prior administration for hiding the true extent of the disruption, which he compared to terrorism.
Alas, as Gregory notes, Conti’s most impactful attack turned out to be its last. By the end of June, Conti’s public-facing website, where it had taunted its victims, was shut down, and so was its dark-web negotiations site, security researchers said. Conti’s downfall began after declaring its support for the Russian invasion on Feb 24. Following that, the group was betrayed by one of its insiders, a Ukrainian hacker-for-hire, who leaked their toolkits, internal chats and other secrets online in retaliation.
This compounded the issue for Costa Rica, as Gregory notes. Their efforts to regain control of their IT systems came alongside Conti’s demise, further complicating their efforts. One western intelligence official who has been fully briefed on the investigations, said that even if Chaves had agreed to pay the ransom, which varied from $20mn to as low as $1mn, it’s “not clear who was on the other end of the line. By June, nobody was answering the phone, figuratively speaking. Conti in Costa Rica was somewhat of a desperate last try to gain any sort of title, some buzz around their actions”.
Of course, paying the ransom is no guarantee that you’ll get your data. As I recently published here in a list of cyber stats, out of all ransomware victims, 32% pay the ransom, but they only get 65% of their data back. Yet, only 57% of businesses are successful in recovering their data using a backup after a ransomware attack. So, many organizations are “damned if they do and damned if they don’t”.
Gregory reports that it’s so bad that, until recently, the country’s customs systems had to resort to using paper and email, slowing down the entire process. But a senior Costa Rican government official has said many of the finance ministry’s systems have now been restored, including customs and salaries. So, there may finally be hope.
Wired reports that Conti has more than 1,000 ransomware attacks (per CISA) and extorted more than $180 million from its victims – just last year(!) – and more than twice as much as the next highest ransomware group. Now, remnants of Conti are re-emerging as part of new groups, such as BlackBasta, which has already hit 50 organizations in just a few months (including this one).
This analogy may be a reach, but I’ll say it anyway: If Conti is the “Beatles of ransomware groups”, does that make BlackBasta the “Paul McCartney and Wings of ransomware groups”? Unfortunately, for companies – and even governments like Costa Rica – it means that the hits just keep coming.
So, what do you think? Could this happen to your organization? Please share any comments you might have or if you’d like to know more about a particular topic.
Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by my employer, my partners or my clients. eDiscovery Today is made available solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscovery Today should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.
[…] publish Costa Rica Reduced to Pen and Paper by Ransomware: Cybersecurity Trends appeared first on eDiscovery Today by Doug […]
[…] the Conti gang still around after their Costa Rican attack? One US government program seems to think so, as they have offered a $10 million reward on Conti […]