On 16 April 2022, the ContiNews ransomware PR site posted the gang’s newest victim: the Ministry of Finance of Costa Rica. Three days later, the post was updated with a sample of the stolen data, and a threat to continue attacks against Costa Rican agencies unless the government paid a requested ransom of $10 million.

On April 21, the post was updated to include the URLs of two more compromised government departments – the Ministry of Labour and Social Security and the Fund for Social Development and Family Allowances – shortly followed by an invite to Costa Rican hackers to monetize the growing tranche of published data. A freshly inaugurated government led by Rodrigo Chaves has not obliged Conti, instead declaring a State of Emergency in response to the attacks, which the president has compared to terrorism.

But now it’s more bad news for Costa Rica as previous ransomware demands made on the country bringing it to a state of emergency have been raised to $20m, with threat actors threatening to overthrow President Chaves’ government. The Conti ransomware gang has also urged Costa Rican residents to “go to your government and organize rallies so that they would pay us as soon as possible. If your current government cannot stabilize the situation? Maybe its [sic] worth changing it?”

This is something Searchlight Security analysts have recently explored in an in-depth blog on the situation looking at who the threat actor UNC1756 is. Louise Ferrett, a threat analyst with Searchlight Security also said:

“Threat actor UNC1756’s claims that it has insiders in the Costa Rican government should be treated with some scepticism. Dark web records reveal a user by this moniker has only been active on a popular cybercrime forum since March 2022 – around a month before the attacks on Costa Rica started. So, while it’s possible UNC1756 could have bribed or socially engineered insiders within the country’s government, it seems unlikely they would have amassed so much influence so quickly. Even considering the longevity and previous successes of Conti as a whole, it is a known tactic for ransomware gangs to make exaggerated and outlandish threats in order to instil a sense of urgency in the victim and obtain a ransom payment. Costa Rica’s government should continue with its recovery plan as laid out by experts, while remaining vigilant for any evidence of malicious insiders.”



The post Who is UNC1756 – the hacker threatening Costa Rica? appeared first on IT Security Guru.


You May Also Like

Several EA accounts compromised by phishing mails

Recently, it has been revealed that several EA Sports accounts were compromised…

Italian Municipality of Palermo Suffers Cyberattack

On Friday the municipality of Palermo, Italy, suffered a cyberattack. The attack…

United States military hacking unit acknowledges offensive action to disrupt malware

US military’s hacking unit, Cyber Command, has taken offensive action to disrupt…

Unpatched SpringShell bug threatens web app security

A new critical remote code execution bug, dubbed “SpringShell” by some in…