Google announced former Conti ransomware attacked Ukrainian Organizations

Google announced former Conti ransomware attacked Ukrainian Organizations

Experts from Google’s TAG ie Threat Analysis Group have said that some former members of the Conti Ransomware Group, which have now joined the UAC-0098 Group, and now European non-governmental companies and organizations, as well as Ukrainian organizations and companies, have their own are targeting.

Ukrainian Organizations

Let me tell you that UAC-0098 is a type of Early Access Broker that works by using the IcedID Banking Trojan virus to access Ransomware in the network of any target company.

Threat Analysis Group has been closely monitoring UAC-0098’s activities since April of 2022, probably as a result of it discovering a phishing campaign and also sending Conti-linked anchor mail to the backfoot. forced. Now many people will be curious to know what is this Threat Analysis Group. So let me tell you TAG ie Threat Analysis Group is an authentic team of defense experts, which acts as a security force for Google users from all types of attacks sponsored by the state.

All the attacks related to this group were seen from the middle of April to the middle of June of this year and then after that, the attackers of the group changed their strategy, and perhaps this would be the reason behind this their baits would not have worked. Given information related to this attack, experts said that the attackers behind this attack were very clever because they had introduced themselves by changing their identity, they pretend themselves were representatives of Elon Musk and Starlink, and sometimes pretends to be Ukraine’s National Cyber Police.

After attacking European NGOs and Ukrainian organizations, a campaign was launched in which IcedID and Cobalt strike payloads were distributed through UAC-0098. By the way, the attackers keep on finding some new way of attacking continuously and for this, they also create different types of viruses apart from these researchers work hard to thwart these attackers in their efforts and create necessary Guidelines if we want to be safe from such attacks, then we should also follow the guideline made by them.

you can also read

Lenovo Company updated BIOS and fix Security Bugs in Hundred of Device

Attackers Demands $10 million to unlock computer from CHSF

Above 200 npm & PyPi Packages dropping Linux crypto miners found by Security Experts

Use Google Indexing API for Instant Indexing and Ranking

32 ways to Get Google to Index your Website Quickly in 2022

Keyword Research For SEO in 2022: Guide For Beginners

How to start a blog for beginners (2022 Guide)

About the author

Christopher Edwards

Hey This is Chris, I am a Malware researcher and security analyst. I love to find out about new threats and viruses and I started this website to teach people how to stay safe online. You will get all the latest malware removal tips and tricks here. You can also ask for any virus related problem in comment section or through our contact page.