Ransomware Roundup: 05.13.22

Written by
Halcyon Team
Published on
May 13, 2022

Costa Rica’s President Rodrigo Chaves declared a national state of emergency as a result of attacks by the Conti Group on multiple governmental bodies. The government recently declined to pay the a $10 million U.S. dollar ransom, and Conti responded by releasing a trove of data allegedly stolen from the victim agencies.

Lincoln College announced on its website that the college would be permanently closing on its website as of May 13, 2022 - citing the strains of the corona virus pandemic and a recent incident involving ransomware as its reasons for shuttering. “Lincoln College has survived many difficult and challenging times – the economic crisis of 1887, a major campus fire in 1912, the Spanish flu of 1918, the Great Depression, World War II, the 2008 global financial crisis, and more, but this is different,” the college posted in its message.

This tragedy highlights the importance of anti-ransomware efforts. These attacks are not ephemeral and affect the lives of actual humans.

As a response to the ransomware threat, the United States Federal Government announced measures that target ransomware actors.

The U.S. Department of the Treasury leveled sanctions against a virtual currency mixer Blender.io in an effort to hit ransomware gangs in their wallets.

“Today, for the first time ever, Treasury is sanctioning a virtual currency mixer,” said Under Secretary of the Treasury for Terrorism and Financial Intelligence Brian E. Nelson. “Virtual currency mixers that assist illicit transactions pose a threat to U.S. national security interests. We are taking action against illicit financial activity by the DPRK and will not allow state-sponsored thievery and its money-laundering enablers to go unanswered,” the United States Deportment of the Treasury wrote in its May 6 announcement.

The U.S. State Department also announced a $10,000,000 reward against the ransomware group as the agency is ostensibly fed up with Conti’s stuff (editor’s note: the author used another word here, but we intervened for the sake of good taste and professionalism).

“The Department of State is offering a reward of up to $10,000,000 for information leading to the identification and/or location of any individual(s) who hold a key leadership position in the Conti ransomware variant transnational organized crime group,” the agency wrote in its announcement. In addition, the State Department also offered a $5 million reward for information relating to information on any individual associated with the group.

Finally, the world wished a very unhappy anniversary to the WannaCry ransomware this week. The ransomware strain emerged on May 12, 2017, and “in a matter of days spread to some 300,000 computers worldwide” according to DarkReading writer Jai Vijayan.

WannaCry is still active, though not as prolifically as half a decade ago.

Subscribe to receive the latest blog posts to your inbox every week.

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Related Posts

See All Blog Posts

Ransomware Roundup: 05.22.23

This week in ransomware news: Ransomware Shutters Philadelphia Inquirer; Bl00dy PaperCut Vulnerability Exploit; US Sanctions Ransomware Operator...

Read the Blog

Ransomware Roundup: 05.15.23

This week in ransomware news: White House Weighs Ban on Ransom Payments; Novel Cactus Ransomware Abuses VPNs; Akira Emerges with Ransom Chat Channel...

Read the Blog

Ransomware Roundup: 05.08.23

This week in ransomware news: ALPHV Monitored IR Communications; Ransomware Operators Automate Exploits; AvosLocker Broadcasts to Victims...

Read the Blog

The Halcyon Platform

Halcyon is the industry’s first dedicated, adaptive security platform focused specifically on stopping ransomware attacks. Halcyon is built by offensive security experts to stop attackers. Our platform is a lightweight agent that combines multiple proprietary advanced prevention engines along with AI models trained solely on ransomware.

Ready to get a demo? Fill out the form and let’s talk!

Get a Demo

Meet with a Halcyon Anti-Ransomware Expert

Cookie Consent

By clicking “Accept”, you agree to the storing of cookies on your device to enhance site navigation, analyze site usage, and assist in our marketing efforts. View our Privacy Policy for more information.