Conti ransomware family packs multiple unique features, including improving performance and giving its operators the option to only target networked SMB shares. The malware improves performance through the use of “up to 32 simultaneous encryption efforts,” and is likely directly controlled by its operators, which means that it can target network-based resources and skip local files, similarly to what the Sodinokibi ransomware can do. The notable effect of this capability is that it can cause targeted damage in an environment in a method that could frustrate incident response activities. A successful attack may have been destroyed that’s limited to the shares of a server that has no Internet capability, but where there is no evidence of similar destruction elsewhere in the environment.
Bank Indonesia (BI) is the Central Bank of the Republic of Indonesia. BI has confirmed today that a ransomware attack hit its networks last month. Ransomware payloads were deployed on the systems of the BI employees.
“We were attacked, but so far so good as we took anticipatory measures and most importantly public services at Bank Indonesia were not disrupted at all,” the head of BI’s communications department, Erwin Haryono, said.
“BI is aware of a ransomware hack last month. We are aware that we have been hit by a cyber attack. This is a crime, it is real, and we are exposed to it,” Haryono added according to local media.
Conti leaked some of the data that was stolen and therefore has taken responsibility for the attack. In all, the ransomware group claims to have 13.88 GB worth of documents to leak if Bank Indonesia doesn’t pay the ransom.