ZDNet reports that while the Conti ransomware group has been a prolific force in cyber espionage engaging in significant network attacks and seeking millions of dollars in ransom payments, the ransomware gang has been operating like a typical organization, with its tester, coders, system administrators, and HR staff.
Internal chat logs leaked after Conti expressed support for Russia amid its invasion of Ukraine also revealed that some of the ransomware gang's members were not initially aware of being engaged in illegal operations, according to a Check Point report.
Researchers said that while the leak has been a major blow to Conti's operations, its employees will likely remain due to increasingly limited job opportunities stemming from sanctions imposed against Russia.
"The availability of potential positions in the legitimate tech sector in Russia for developers and pen testers have become much lower, so I think even the unwitting employees that now understand what they are doing, will move to cybercrime, as it will be difficult for them to find a legit job," said Check Point Software Threat Intelligence Group Manager Sergey Shykevich.
The Philippine Health Insurance Corporation, which manages the country's universal healthcare system, had its websites and portals disrupted by a Medusa ransomware attack last week, from which it is struggling to recover, reports The Record, a news site by cybersecurity firm Recorded Future.
Japanese multinational conglomerate Sony has begun an investigation into an alleged cyberattack, which was reported to have resulted in the exposure of 3.14 GB of data in hacking forums, amid the emergence of different attackers claiming to be behind the hack, according to BleepingComputer.
Threat actors have leveraged the ZeroFont phishing attack technique, which initially involved the insertion of hidden characters or words in emails to evade security detection systems, to modify message previews as shown on Microsoft Outlook and other email clients, BleepingComputer reports.