www.rivitmedia.comwww.rivitmedia.comwww.rivitmedia.com
  • Home
  • Tech News
    Tech NewsShow More
    Microsoft’s May 2025 Patch Tuesday: Five Actively Exploited Zero-Day Vulnerabilities Addressed
    7 Min Read
    Malicious Go Modules Unleash Disk-Wiping Chaos in Linux Supply Chain Attack
    4 Min Read
    Agentic AI: Transforming Cybersecurity in 2025
    3 Min Read
    Cybersecurity CEO Accused of Planting Malware in Hospital Systems: A Breach of Trust That Shocks the Industry
    6 Min Read
    Cloud Convenience, Criminal Opportunity: How Google Sites Became a Launchpad for Elite Phishing
    6 Min Read
  • Cyber Threats
    • Malware
    • Ransomware
    • Trojans
    • Adware
    • Browser Hijackers
    • Mac Malware
    • Android Threats
    • iPhone Threats
    • Potentially Unwanted Programs (PUPs)
    • Online Scams
    • Microsoft CVE Errors
  • How-To-Guides
  • Product Reviews
    • Hardware
    • Software
  • IT/Cybersecurity Best Practices
  • FREE SCAN
  • Cybersecurity for Business
Search
  • ABOUT US
  • TERMS AND SERVICES
  • SITEMAP
  • CONTACT US
© 2023 rivitMedia.com. All Rights Reserved.
Reading: Is Conti ransomware the successor to the infamous Ryuk ransomware?
Share
Notification Show More
Font ResizerAa
www.rivitmedia.comwww.rivitmedia.com
Font ResizerAa
  • Online Scams
  • Tech News
  • Cyber Threats
  • Mac Malware
  • Cybersecurity for Business
  • FREE SCAN
Search
  • Home
  • Tech News
  • Cyber Threats
    • Malware
    • Ransomware
    • Trojans
    • Adware
    • Browser Hijackers
    • Mac Malware
    • Android Threats
    • iPhone Threats
    • Potentially Unwanted Programs (PUPs)
    • Online Scams
  • How-To-Guides
  • Product Reviews
    • Hardware
    • Software
  • IT/Cybersecurity Best Practices
    • Cybersecurity for Business
  • FREE SCAN
  • Sitemap
Follow US
  • ABOUT US
  • TERMS AND SERVICES
  • SITEMAP
  • CONTACT US
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
ransomware, stop/djvu
www.rivitmedia.com > Blog > Cyber Threats > Ransomware > Is Conti ransomware the successor to the infamous Ryuk ransomware?
Ransomware

Is Conti ransomware the successor to the infamous Ryuk ransomware?

riviTMedia Research
Last updated: October 24, 2023 4:30 pm
riviTMedia Research
Share
Is Conti ransomware the successor to the infamous Ryuk ransomware?
SHARE

Conti ransomware is a threat that targets corporate networks with features that allow it to perform fast and targeted attacks. There are also many indications that this ransomware shares the same code as Ryuk ransomware, which has slowly been fading away according to reports. This ransomware strain was first seen in isolated attacks that occurred at the end of December 2019, and since then, attacks have gradually increased.

The Conti and Ryuk Ransomware Connection and Differences

In August of 2017, Hermes ransomware was made available for sale on the Exploit.in hacking forum by a Russian cybercriminal. According to Advanced Intel’s Vitali Kremez, hackers may have purchased this ransomware builder and turned it into Ryuk ransomware. It seems that eventually, the hackers using Ryuk may have re-branded and slowly transitioned towards the use of “Conti,” which looks to be based on code from the 2nd version of Ryuk. In addition to similarities in code, the Conti ransom note has been identified to use the same template utilized by Ryuk in earlier attacks.

Like most other ransomware strains, Conti ransomware determines which files to encrypt by scouring through files on local systems and SMB network shares. Then, it uses AES-256 encryption via a hard-coded public key to encrypt the files. Conti ransomware also sports multiple anti-analysis features, including a unique string encoding routine in nearly every string text meant to slow detection and reverse engineering. This technique is used to hide the ransomware’s various Windows API calls.

When encrypting victim’s files, Conti uses a Windows API called ‘Windows Restart Manager’ that terminates processes or Windows services that maintain a file open during encryption. Windows Restart Manager was created by Microsoft to make it easier to install software updates without having to restart your computer, and ransomware strains are starting to use it to help encrypt databases and other vital files that are unobtainable while opened by other processes.

“The Restart Manager API can eliminate or reduce the number of system restarts that are required to complete an installation or update. The primary reason software updates require a system restart during an installation or update is that some of the files that are being updated are currently being used by a running application or service. The Restart Manager enables all but the critical system services to be shut down and restarted. This frees files that are in use and allows installation operations to complete,” according to Microsoft’s API documentation.

Conti ransomware is not the first ransomware to use this API. Ransomware strains such as REvil or Sodinokibi, Medusa Locker, SamSam, and LockerGoga are also using the Windows Restart Manager API during their encryption process, and in some cases, their decryption process. With Conti ransomware’s distribution increasing and impressive advanced features, this ransomware is sure to be a nuisance for at least the time being.

You Might Also Like

Remove Forgive Ransomware
DearCry & Black Kingdom Ransomware & Lemon Duck Cryptominer Have Successfully Exploited Microsoft Exchange Server Vulnerabilities
How to Deal with the LICC Ransomware Infection?
DarkDev Ransomware: The Malicious Threat
How to Deal with JAZI Ransomware?
TAGGED:Conti ransomwareransomwareRyuk Ransomware

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Copy Link Print
Share
Previous Article Fall security tips for staying safe while surfing the Web.
Next Article Expired Domains Can Redirect you to Malicious Websites loaded with Ransomware?
Leave a Comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Scan Your System for Free

✅ Free Scan Available 

✅ 13M Scans/Month

✅ Instant Detection

Download SpyHunter 5
Download SpyHunter for Mac

//

Check in Daily for the best technology and Cybersecurity based content on the internet.

Quick Link

  • ABOUT US
  • TERMS AND SERVICES
  • SITEMAP
  • CONTACT US

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

www.rivitmedia.comwww.rivitmedia.com
© 2023 • rivitmedia.com All Rights Reserved.
  • ABOUT US
  • TERMS AND SERVICES
  • SITEMAP
  • CONTACT US