2022 Costa Rican ransomware attack

Attack on Costa Rican government systems

2022 Costa Rican cyberattack
Website of the Ministry of Finance showing a static message advising of the work to restore service as a result of the attack.
LocationCosta Rica
DateApril 17, 2022
Attack type
Cyberattack
WeaponRansomware
PerpetratorsConti ransomware group, Hive ransomware group

Beginning on the night (UTC-6:00) of April 17, 2022, a ransomware attack began against nearly 30 institutions of the government of Costa Rica, including its Ministry of Finance, the Ministry of Science, Innovation, Technology and Telecommunications (MICITT), the National Meteorological Institute, state internet service provider RACSA, the Costa Rican Social Security Fund (Caja Costarricense de Seguro Social, CCSS), the Ministry of Labor and Social Security [es], the Fund for Social Development and Family Allowances, and the Administrative Board of the Municipal Electricity Service of Cartago.[1][2]

The pro-Russian Conti Group claimed the first group of attacks and demanded a US$10 million ransom in exchange for not releasing the information stolen from the Ministry of Finance, which could include sensitive information such as citizens' tax returns and companies operating in Costa Rica.[3][4][5]

As a consequence, the government had to shut down the computer systems used to declare taxes and for the control and management of imports and exports, causing losses to the productive sector on the order of US$30 million per day.[6][7] Likewise, the web pages of the Ministry of Science, Innovation, Technology and Telecommunications were removed from the network.

Costa Rica required technical assistance from the United States, Israel, Spain, and Microsoft, among others, to deal with the cyber attack. The attack consisted of infections of computer systems with ransomware, defacement of web pages, theft of email files and attacks on the Social Security human resources portal, as well as on its official Twitter account.[8][9]

On May 6, 2022, the United States government through the FBI offered a US$10 million reward for information leading to the identification of a person or persons in a leadership position within the Conti Group, and an additional US$5 million for information leading to the capture or conviction, in any country, of individuals who aided or conspired to carry out Conti ransomware attacks.[10][11]

On May 8, 2022, the new president of Costa Rica, Rodrigo Chaves Robles, decreed a state of national emergency due to cyber attacks, considering them an act of terrorism. Days later, at a press conference, he stated that the country was in a state of war[12][13] and that there was evidence that people inside Costa Rica were helping Conti, calling them "traitors" and "filibusters".[14][15]

On May 31, 2022, at dawn, the Hive Ransomware Group carried out an attack against the Costa Rican Social Security Fund, forcing the institution to turn off all of its critical systems, including the Unique Digital Health File and the Centralized Collection System.[16][17] The former stores sensitive medical information of patients using Social Security, while the latter is used to collect the population's insurance fees.[18]

Background

Conti Group

Conti Group is a criminal organization dedicated to carrying out ransomware attacks, stealing files and documents from servers and then demanding a ransom. Its modus operandi is to infect computers with the Conti malware, which operates with up to 32 individual logical threads, making it much faster than most viruses of its kind.[19]

The oldest member is known by the aliases Stern or Demon and acts as CEO. Another member known as Mango acts as the general manager and communicates frequently with Stern. Mango told Stern in a message that there were 62 people on the core team. The numbers of people involved fluctuate, reaching up to 100. Due to the constant turnover of members, the group recruits new members through legitimate job recruitment sites and hacker sites.[20]

Ordinary programmers earn $1,500 to $2,000 per month, and members who negotiate ransom payments can take a cut of the profits. In April 2021, a member of the Conti Group claimed to have an anonymous journalist take a 5% cut of ransomware payments by pressuring victims to pay.[20]

During the Russian invasion of Ukraine of 2022, the Conti Group announced its support for Russia and threatened to implement "retaliatory measures" if cyber-attacks were launched against the country.[20][21][22] As a result, an anonymous person leaked approximately 60,000 internal chat log messages along with source code and other files used by the group.[23][24]

Opinions expressed in the leaks include support for Vladimir Putin, Vladimir Zhirinovsky, and antisemitism (including towards Volodymyr Zelensky). A member known as Patrick repeated several false claims made by Putin about Ukraine. Patrick lives in Australia and may be a Russian citizen. Messages containing homophobia, misogyny and references to child abuse were also found.[25]

Conti has been responsible for hundreds of ransomware incidents since 2020. The FBI estimates that, as of January 2022, there were more than 1,000 victims of attacks associated with Conti ransomware with victim payouts exceeding $150 million, making Conti's the most damaging ransomware strain ever documented.[26]

Days after the FBI's announcement, Conti announced that they would begin a shutdown process.[27] Some of the Conti members migrated to smaller organizations like Hive, HelloKitty, AvosLocker, BlackCat, and BlackByteo; others founded groups of their own.[28]

Hive Ransomware Group

Hive ransomware group is a criminal organization known for attacking public health organizations and institutions, particularly hospitals and clinics.[29] It first appeared in June 2021.[30]

Bleeping Computer LLC reported that some of the Conti hackers migrated to other ransomware gangs, including Hive[16] though the rival group[31] has denied having any connection with Conti, despite that, once the process of closing operations began and its hackers reached Hive, it then began to employ the tactic of publishing leaked data on the deep web, just as Conti had.[16] AdvIntel expert Yelisey Boguslavskiy identified, with a high level of certainty, that Conti had been working with Hive since at least November 2021. According to her information, Hive was actively using the initial attack access provided by Conti.[16] Unlike the Conti Group, Hive is not associated with direct support for the Russian invasion of Ukraine, even though the ransom payment to Hive is likely to be received by the same people within Conti who claimed the group's collective alignment with the Russian government.[16]

In July 2022, the FBI infiltrated Hive. Undercover Tampa, Florida Field Office agents acquired full access and acted as a subsidiary in the Hive network undetected for seven months, while gathering evidence and secretly generating decryption keys for victims to recover their data. in January 2023, the United States Department of Justice announced that they had dismantled Hive by seizing the group's servers, in coordination with Germany and the Netherlands.[32]

Attacks

Conti Group attack

The servers of the Ministry of Finance were the first to be compromised during the night of Sunday, April 17. The Conti Group had compromised credentials, which allowed it to install malware on one device in the Ministry of Finance network.[33] The BetterCyber Twitter account was the first to replicate, the next day, the post on the Conti Group forum that reported the hacking of the government institution, indicating that 1 terabyte of information had been stolen from the Virtual Tax Administration (ATV) platform, used by the government for citizens and companies to file their tax returns. In turn, the publication indicated that the data would begin to be published on April 23.[34]

Before 10 a.m. on April 18, the Ministry of Finance informed through a press release and through its social networks that, "due to technical problems", the ATV platform and the Customs Information System (TICA) had been disabled and that the deadline for filing and paying taxes that were due that day would be extended until the next business day after the systems were restored.[35] The institution did not immediately acknowledge being hacked and initially refused to answer questions from the press about the Conti Group claim.[36][37]

The next day, Conti Group posted a new post on their forum announcing that they were asking for US$10 million in ransom for the stolen information.[38] The Ministry of Finance confirmed that the information published so far corresponded to information from the National Customs Service, used for supplies and support.[39]

In relation to the communications that have been detected on social networks, and classified as hacking, the Ministry of Finance communicates the following:

Indeed, since early today we have been facing a situation in some of our servers, which has been attended by our staff and by external experts, who during the last few hours have tried to detect and repair the situations that are occurring.

This Ministry has made the decision to allow the investigation teams to carry out an in-depth analysis of the information systems, for which it has made the decision to temporarily suspend some platforms such as ATV and TICA, and services will be restarted once the teams complete their analyses.

In the last few hours, the exposure of some of the data belonging to the General Directorate of Customs has been detected, which is carrying out the information investigation processes, as established in the response plan.

The data identified so far are of a historical nature and are used by the National Customs Service as inputs and support.

— Ministry of Finance

Hours after the Treasury statement, the microsite of the Ministry of Science, Innovation, Technology and Telecommunications suffered a defacement with a message reading, "We greet you from Conti, look for us on your network."[40][41][42]

Jorge Mora Flores, director of Digital Governance of Costa Rica, indicated that as a result of the attack, and because the affected server hosts other pages, the decision was made to turn it off while checks were carried out to determine to what extent security was breached.[42] Subsequently, an update on the Conti Group forum indicated that the attacks against Costa Rican ministries would continue "until the government pays us".[43]

Hours later, Conti attacked an email server of the National Meteorological Institute, stealing the information contained therein.[44][45] Conti stated that the scenario that Costa Rica was experiencing was a "beta version of a global cyber attack on an entire country".[46] Later, in another update on their forum, they indicated that if the Ministry of Finance did not inform their taxpayers of what was happening, they would carry out additional actions:

If the minister cannot explain to his taxpayers what is going on, we will: 1) have penetrated his critical infrastructure, gained access to over 800 servers, downloaded over 900 GB of databases and over 100 GB of internal documents, databases in the MSSQL mdf format, there is more than just the email, first name, last name... If the minister considers that this information is not confidential, we will publish it. The leak problem is not the Ministry's main problem, their backups were also encrypted, 70% of their infrastructure will probably not be able to be restored and we have backdoors in a large number of their ministries and private companies. We ask for a significantly small amount of what you will spend in the future. Their export business is already in trouble and they've already lost the $10 million they could have paid us.

— Conti Group

Later that day, the Costa Rican government denied having received a ransom request, despite Conti Group's forum post regarding the US$10 million.

(VIDEO) Press conference of the Government of Costa Rica on April 20.

On April 20, Conti published an additional 5 GB of information stolen from the Ministry of Finance.[47] In the afternoon, the Government called a press conference at the Presidential House where it argued that the situation was under control, and that in addition to the Treasury, MICITT and the IMN, Radiografía Costarricense S.A. (RACSA), a state internet service provider, had been attacked through an internal email server breach.[48][49] In the meantime, the Costa Rican Social Security Fund reported having suffered a cyber attack on its human resources site, which was being combated.[50][51] Conti Group did not claim responsibility for the attack, since the Fund reported hours later that no sensitive information was stolen from the insured, such as their medical history or contributions to pension or health insurance, and that the databases had been left behind intact.[52]

The Minister of the Presidency, Geannina Dinarte Romero, indicated that this was a case of international organized crime and that the Government of Costa Rica would not pay any ransom.[53] She also announced that they were receiving technical assistance from the governments of the United States, Israel and Spain, as well as from Microsoft, which operated the servers of the Ministry of Finance.[53]

Early on April 21, Conti Group attacked the servers of the Ministry of Labor and Social Security, as well as the Social Development and Family Allowances Fund. The preliminary report of the government indicated that information such as emails and data on pension payments and social aid from both institutions was stolen.[54] Likewise, the group offered a 35% discount on the amount of the ransom demanded if the Government of Costa Rica made a prompt payment.[55] Before noon, the Ministry of Science, Innovation, Technology and Telecommunications held a press conference where the Government reiterated its position of not paying the ransom demanded by the Conti Group, for which hours later the criminal group announced that it would immediately begin publishing the stolen information, urging Costa Rican cybercriminals to take advantage of it to commit phishing.[56][57]

(VIDEO) Statement by President Carlos Alvarado Quesada on the hacking.

President Carlos Alvarado Quesada gave his first public statement on the hack that day.[58]

I reiterate that the Costa Rican State WILL NOT PAY ANYTHING to these cybercriminals. But my opinion is that this attack is not a matter of money, but rather seeks to threaten the stability of the country, in a situation of transition. This they will not do. As we have always done, each person on this earth will do their part to defend Costa Rica.

— Carlos Alvarado Quesada
(VIDEO) Minister of the Ministry of Science, Innovation, Technology and Telecommunications on the directive signed after the cyberattack.

In the afternoon, the Government issued a directive addressed to the public sector in order to protect the proper functioning, confidentiality and cybersecurity of public institutions. The document provides that, in the event of any situation that affects the confidentiality, availability and integrity of services available to the public, the continuity of institutional functions, or the identity theft of the institution on social networks—even those that within the institution are considered to be under control—the Computer Security Incident Response Center (CSIRT-CR) must be informed of the event. In addition, agencies are required to back up information regarding the incident for use in investigations.[59] Likewise, institutions must carry out maintenance of their telecommunications infrastructure—whether through public employees or private contractors—including regular updates of institutional systems, changing passwords of all institutional systems and networks, disabling unnecessary services and ports, and monitoring network infrastructure, as well as taking heed of alerts from the CSIRT-CR.[59] The guideline also orders a vulnerability scan to be carried out at least twice a year on the official websites of the government of Costa Rica.[59]

On the morning of April 22, the government reported that no new Conti Group attacks against the country had been recorded since the previous day. However, the director of Digital Governance, Jorge Mora, explained that since Monday, when they began to take preventive measures in state institutions, they have detected 35,000 malware communication requests, 9,900 phishing incidents, 60,000 attempts to take remote control of IT systems, and 60,000 attempts to mine cryptocurrencies using the computer infrastructure of the first 100 state institutions intervened.[60]

On April 23, the Conti Group attacked the Administrative Board of the Municipal Electrical Service of Cartago, the public company in charge of electricity supply in the province of Cartago.[61] Jorge Mora Flores reported that day that subscriber information could have been compromised;[62][63] the next day, he reported that the institution's accounting and human resources information was encrypted as part of the attack.[64]

On April 25, Conti announced that it would shift its strategy from attacking state institutions to focus on large companies in the private sector; in addition, it would stop announcing its hacks on its deep web page to focus on requesting ransoms for stolen and encrypted information.[65]

On April 26, the MICITT reported that the website of the Sede Interuniversitaria de Alajuela, a multi-university campus, was attacked; in addition, there was an attempt to breach the servers of the Instituto de Desarrollo Rural [es] (Rural Development Institute), which was effectively repelled.[66] On April 29, the government reported a hacking attempt to the Ministry of Economy, Industry and Commerce[67] and a day later against the National Liquor Factory and the municipalities of Turrialba and Golfito.[68]

On May 2, another hacking attempt was reported at the Ministry of Justice and Peace (MJP), although it was rebuffed.[69] The next day, unsuccessful cyberattacks were reported on the municipalities of Garabito and Alajuelita,[70] as well as on the San José Social Protection Board [es], a national charitable organization that administers the country's national lottery.[71]

On May 4, MICITT reported hacking attempts to the National Education Loan Commission and one more to the Cartago University College (CUC), although the latter was not Conti's responsibility.

Nearly two months after the original attack, on June 11, the Ministry of Finance announced that the ATV tax system would be restarted on June 13 so that Costa Ricans could make their payments.[72] On June 24, two other systems disabled by Conti attacks were restored: TICA (Spanish: Tecnología de Información para el Control Aduanero, Customs Control Information Technology)[73] and Exonet, a platform used to manage and process tax exemption requests.[74]

Hive Ransomware Group attack

On May 31 at two in the morning (UTC-6:00), the Costa Rican Social Security Fund (CCSS) detected anomalous information flows in its systems and began to receive reports from different hospitals of unusual behavior in various computers; it immediately proceeded to turn off all its critical systems, including the Single Digital Health File (Expediente Digital Único en Salud, EDUS) and the Centralized Collection System. Some printers in the institution printed messages with random codes or characters,[75] while others printed default instructions from the Hive Ransomware Group on how to regain access to systems.[76]

In a press conference before noon, CCSS officials described the attack as "exceptionally violent" and detailed that the first incidents were recorded at the San Vicente de Paul Hospital, in the province of Heredia and then in the Hospital of Liberia, province of Guanacaste; from there, attacks were carried out on the hospitals of the Greater Metropolitan Area.[77] The president of the CCSS, Álvaro Ramos Chaves, affirmed that databases with sensitive information were not compromised but noted that at least thirty servers (of the more than 1,500 that the institution has) were contaminated with ransomware. He added that they had a plan to restore the systems, but that it would take time because each piece of equipment had to be reviewed to ensure hackers no longer had access.[77]

As a consequence, a number of insured persons saw their medical appointments cancelled.[78] The CCSS medical centers had to resort to running on paper, as the digital backup system, the Digital File in a Contingency Environment (Expediente Digital en Ambiente de Contingencia, EDAC), was also taken down as a security measure, a situation that could remain that way for an indefinite period.[77] Medical facilities were left without access to the EDUS, EDAC, and such systems including the hospital occupancy control system (ARCA) and billing. Financial areas of the CCSS were unable to use systems including the Centralized Collection System (SICERE), the Disability Control and Payment Registry (RCPI), and the Integrated Voucher System (SICO). Offices and administrative areas were unable to use computers; teleworkers could only access Office 365 (Word, Excel, PowerPoint, Outlook, and Teams).[79][80]

In total, on the first day of effects from the cyberattack, 4,871 users missed their medical appointments,[81] with another 12,000 missing appointments the next day. The CCSS reported that the laboratory service was the most affected, with only 45 percent operating normally and 48 percent partially affected. A review of 108 health establishments showed that 96% of hospital services operated with a contingency plan, 18% of outpatient consultations were partially affected, 19% of radiology and medical imaging services were partially affected, and 37% of pharmacy services were affected.[82]

On June 1, during a press conference at the Presidential Palace, the executive president of the CCSS, Álvaro Ramos Chaves, announced the opening of an administrative investigation against the agency's Information Technology Department for the hack, to determine if there was negligence. President Chaves Robles noted that fewer than 15 CCSS computers had the microCLAUDIA system donated by Spain installed after the Conti attacks.[83] Ramos Chaves also revealed that the effects of the attack were 27 times greater than what was reported on the first day: more than 800 servers and 9,000 end-user computers were affected, making it impossible to restore all systems within a week as initially planned.[83]

On June 2, the Hive Ransomware Group requested $5 million in bitcoin so that the CCSS could get its services back.[84]

On June 4, the Superintendency of Pensions (SUPEN) announced the suspension until further notice of the possibility of freely transferring complementary pension funds between the different operators, since this required one of the CCSS systems that was affected by the hack.[85]

Given the fall of its systems for reporting payroll and payment of social contributions, the CCSS had to extend until June 10 the deadline for employers to submit the payroll corresponding to the month of May. Likewise, it announced that self-employed and voluntary insured workers would not be able to pay their monthly installments due to the impossibility of making the corresponding invoice.[86] The pension scheme for Disability, Old Age and Death (IVM) had to enable bank accounts and specific email accounts so that people with mortgage loans could pay their monthly payments and report the installments.[87] Likewise, 163 health establishments of the CCSS set up telephone lines for the population to answer questions regarding the continuity of services and the status of their medical appointments.[88]

Declaration of emergency

On April 22, the then president-elect of Costa Rica, Rodrigo Chaves Robles, announced his intention to declare a national state of emergency once he assumed power due to the cyberattacks against the country's public sector.[89]

On May 3, the Costa Rican Chamber of Industries (CICR), the National Chamber of Freight Carriers (CANATRAC), the Costa Rican Chamber of Foreign Trade (CRECEX), the Chamber of Fiscal and General Deposit Warehouses (CAMALFI), the Costa Rican Chamber of Shippers (NAVE), the Chamber of Exporters of Costa Rica (CADEXCO) and the Association of Customs Agents (AAACR) requested to declare a state of emergency due to the situation of the country's customs as a result of the Conti hack; they warned that within a few days, if the situation did not improve, Costa Rica could face a paralysis of international trade due to the accumulation of cargo containers, since Customs had to carry out procedures on paper, raising the wait to three or even four days to receive approval to move the containers.[90]

On May 8, upon assuming power, Chaves Robles signed Executive Decree No. 43542-MP-MICITT, declaring a state of national emergency due to cyberattacks against the public sector in Costa Rica and ordered the Presidency of the Republic to take control of the coordination of the national response, in lieu of the National Emergency Commission [es], which by law manages situations of declared national emergency.[91]

On May 16, President Chaves affirmed that the country was in a state of war due to Conti's hacks and denounced that there were nationals helping the "terrorist group" that the previous weekend had threatened to overthrow the newly elected government.[92]

We don't know, we don't have information about who is paying us taxes correctly and incorrectly. There is a huge impact on the international trade process since the Customs TICA system is not working. We don't know how the country's budget execution is progressing: Costa Rica doesn't know how much of the budget each person is spending, whether we are going to pay ourselves or not. We are paying salaries almost blindly based on previous payrolls, which represents a huge challenge for the future. What happens if someone surpasses you due to an extraordinary staff and we are repeating the same payroll? There are people who are being paid less by the State than they should be for using old forms. This represents a huge risk because the systems are not flexible to recover excess payments. We have 27 institutions attacked and 9 institutions very affected, including the Ministry of Finance, which is the one that receives the income and makes the expenses of the State. They want to drown us through the financial system of the State's public finances.

— Rodrigo Chaves Robles, President of Costa Rica

The next day, dozens of workers from the Ministry of Public Education [es] (MEP) took to the streets to protest the non-payment of their salaries— payments less than what was due, among other problems related to the impossibility of updating the state payroll due to the hack. The MEP estimated that 16,000 workers were affected, of whom 3,000 did not receive any payments at all. The Ministry of Finance, as a contingency measure, provided a tool that had to be filled out by hand to update employee payments.[93]

On May 21, due to new protests, the unions negotiated with the government, which promised to pay the amounts owed and subsequently recover any sums overpaid to the workers.[94] On May 27, the Constitutional Chamber of the Supreme Court of Justice [es] upheld more than 200 recursos de amparo filed against the state by MEP workers affected in the payment of their salaries and ordered contingency measures to reconcile payments within a month.[95] On May 30, the government announced that the MEP and the Finance Ministry had paid more than ₡6 billion colones as an extraordinary payroll corresponding to 25,618 movements pending cancellation due to the hack.[96]

Impact

This set of attacks drew attention to Latin America's lagging cybersecurity infrastructure. In 2020, 12 countries in Latin America had a national cybersecurity strategy; by July 2023, 20 countries had one.[97]

References

  1. ^ "Hacienda, Micitt, IMN, Racsa y CCSS atacados por 'hackers', confirma Gobierno". La Nación (in Spanish). Archived from the original on June 1, 2022. Retrieved June 7, 2022.
  2. ^ "Portal de Recursos Humanos de CCSS sufre ataque cibernético". La Nación (in Spanish). Archived from the original on June 6, 2022. Retrieved June 7, 2022.
  3. ^ "Gobierno confirma que 'Conti' exige $10 millones de "rescate"". Teletica. April 20, 2022. Archived from the original on May 14, 2022. Retrieved June 7, 2022.
  4. ^ ""En la dark web sí se realizó una publicación que pide $10 millones de, aparentemente, Conti Group"". delfino.cr (in Spanish). Archived from the original on April 21, 2022. Retrieved June 7, 2022.
  5. ^ "Conti amenaza con revelar datos internos de Hacienda y base de contribuyentes". CRHoy.com (in Spanish). Archived from the original on June 9, 2022. Retrieved June 7, 2022.
  6. ^ "Costa Rica reporta pérdidas por $125 millones por caos en aduanas". www.larepublica.net (in Spanish). Archived from the original on June 7, 2022. Retrieved June 7, 2022.
  7. ^ "Importaciones están paralizadas debido a hackeo de Hacienda". CRHoy.com (in Spanish). Archived from the original on April 20, 2022. Retrieved June 7, 2022.
  8. ^ Hidalgo, Kristin. "Vulneran cuenta de Twitter de la CCSS y publican contenido ajeno a la institución". ameliarueda.com (in Spanish). Archived from the original on April 19, 2022. Retrieved June 7, 2022.
  9. ^ "¡Atacan de nuevo! Hackean cuenta de Twitter de la CCSS". CRHoy.com (in Spanish). Archived from the original on April 19, 2022. Retrieved June 7, 2022.
  10. ^ "EE. UU. ofrece $10 millones de recompensa por información sobre líderes de Conti Group". delfino.cr (in Spanish). Archived from the original on May 6, 2022. Retrieved June 7, 2022.
  11. ^ "EE. UU. ofrece recompensa por hackers tras ataque a Costa Rica". Deutsche Welle (in European Spanish). May 7, 2022. Archived from the original on May 15, 2022. Retrieved June 7, 2022.
  12. ^ ""Estamos en guerra": 5 claves para entender el ciberataque que tiene a Costa Rica en estado de emergencia". BBC News Mundo (in Spanish). Archived from the original on June 3, 2022. Retrieved June 7, 2022.
  13. ^ "Costa Rica declara el estado de emergencia por el ciberataque de Conti". derechodelared.com (in Spanish). May 9, 2022. Archived from the original on May 31, 2022. Retrieved June 7, 2022.
  14. ^ "(Video) Rodrigo Chaves: "Conti tiene filibusteros en Costa Rica"". www.larepublica.net (in Spanish). Archived from the original on June 8, 2022. Retrieved June 7, 2022.
  15. ^ "Rodrigo Chaves dice que Costa Rica está "en guerra"". Deutsche Welle (in European Spanish). May 17, 2022. Archived from the original on May 31, 2022. Retrieved June 7, 2022.
  16. ^ a b c d e "Costa Rica's public health agency hit by Hive ransomware". BleepingComputer. Archived from the original on June 6, 2022. Retrieved June 7, 2022.
  17. ^ "CCSS sufrió 'hackeo' durante la madrugada de este martes". Teletica. May 31, 2022. Archived from the original on June 2, 2022. Retrieved June 7, 2022.
  18. ^ "'Hackeo' obliga a hospitales de CCSS a trabajar con computadoras apagadas". La Nación (in Spanish). Archived from the original on June 6, 2022. Retrieved June 7, 2022.
  19. ^ "Conti Ransomware". NHS Digital. Archived from the original on May 24, 2022. Retrieved June 7, 2022.
  20. ^ a b c "The Workaday Life of the World's Most Dangerous Ransomware Gang". Wired UK. ISSN 1357-0978. Archived from the original on May 6, 2022. Retrieved June 7, 2022.
  21. ^ Reichert, Corinne. "Conti Ransomware Group Warns Retaliation if West Launches Cyberattack on Russia". CNET. Archived from the original on May 24, 2022. Retrieved June 7, 2022.
  22. ^ Bing, Christopher (February 25, 2022). "Russia-based ransomware group Conti issues warning to Kremlin foes". Reuters. Archived from the original on June 4, 2022. Retrieved June 7, 2022.
  23. ^ "The Conti ransomware leaks". Malwarebytes Labs. March 1, 2022. Archived from the original on June 8, 2022. Retrieved June 7, 2022.
  24. ^ Sean Lyngaas (March 30, 2022). "'I can fight with a keyboard': How one Ukrainian IT specialist exposed a notorious Russian ransomware gang". CNN. Archived from the original on May 21, 2022. Retrieved June 7, 2022.
  25. ^ Lee, Micah (March 14, 2022). "Leaked Chats Show Russian Ransomware Gang Discussing Putin's Invasion of Ukraine". The Intercept. Archived from the original on June 3, 2022. Retrieved June 7, 2022.
  26. ^ "Reward for Information: Owners/Operators/Affiliates of the Conti Ransomware as a Service (RaaS)". United States Department of State. Archived from the original on May 18, 2022. Retrieved June 7, 2022.
  27. ^ "Conti Ransomware Operation Shut Down After Brand Becomes Toxic". www.securityweek.com. Archived from the original on June 8, 2022. Retrieved June 7, 2022.
  28. ^ "Did the Conti ransomware crew orchestrate its own demise?". ComputerWeekly.com. Archived from the original on May 30, 2022. Retrieved June 7, 2022.
  29. ^ "Hive ransomware group claims to steal California health plan patient data". VentureBeat. March 29, 2022. Archived from the original on May 31, 2022. Retrieved June 7, 2022.
  30. ^ "FBI issues alert about Hive ransomware". Healthcare IT News. September 2, 2021. Archived from the original on May 20, 2022. Retrieved June 7, 2022.
  31. ^ "Hive Ransomware Shut Down by Law Enforcement Operation; FBI in Possession of Decryption Keys, Group's Public-Facing Website". CPO Magazine. Retrieved June 4, 2023.
  32. ^ "How the FBI prevented $130 million in crypto ransomware attacks by hacking the hackers behind Hive". Fortune Crypto. Retrieved May 22, 2023.
  33. ^ "How Conti ransomware hacked and encrypted the Costa Rican government". BleepingComputer. Retrieved July 25, 2023.
  34. ^ "BetterCyber on Twitter: "#Conti claims to have hacked Ministerio de Hacienda, a government ministry in Costa Rica 🇨🇷... #Ransomware #RansomwareGroup #ContiLeaks…". Twitter. Archived from the original on May 20, 2022. Retrieved June 7, 2022.
  35. ^ "Sistemas de Hacienda caídos, ministerio omite referirse a supuesto hackeo". delfino.cr (in Spanish). Archived from the original on April 18, 2022. Retrieved June 7, 2022.
  36. ^ "Ministerio Hacienda de Costa Rica on Twitter: "En este momento las plataformas Administración Tributaria Virtual (Atv) y TICA se encuentran fuera de servicio. Nuestros equipos técnicos trabajan para su restablecimiento en el menor tiempo posible. Inmediatamente se solvente la situación, se comunicará por este mismo medio." Twitter. Archived from the original on April 21, 2022. Retrieved June 7, 2022.
  37. ^ "¿Hackearon Hacienda? Sistemas ATV y TICA fuera de servicio". Teletica. April 18, 2022. Archived from the original on May 12, 2022. Retrieved June 7, 2022.
  38. ^ "BetterCyber on Twitter: "🚨 Latest update from #Conti: "We ask only 10m USD for keeping your taxpayers' data"… "". Archived from the original on May 10, 2022. Retrieved June 8, 2022.
  39. ^ Ministerio Hacienda de Costa Rica. "ACLARACIÓN DEL MINISTERIO DE HACIENDA SOBRE COMUNICACIONES EN REDES SOCIALES CALIFICADAS COMO HACKEO". Twitter. Archived from the original on June 2, 2022. Retrieved June 8, 2022.
  40. ^ "BetterCyber on Twitter: "🚨#Conti allegedly hacks Ministerio de Ciencia, Innovation, Technology, y Telecomunicaciones' website, posting the following message on the compromised website: "We say hello from conti, look for us on your network" #ContiLeaks #Ransomware #RansomwareGroup…". Archived from the original on April 21, 2022. Retrieved June 8, 2022.
  41. ^ "'Ataque al Micitt es simbólico, para deslegitimarlo', dice exviceministro sobre hackeo". La Nación (in Spanish). Archived from the original on May 22, 2022. Retrieved June 7, 2022.
  42. ^ a b "Autoridades confirman que "hackers" atacaron otro ministerio este lunes". Teletica. April 19, 2022. Archived from the original on May 20, 2022. Retrieved June 7, 2022.
  43. ^ "Uživatel BetterCyber na Twitteru: "🚨 Latest update on #Conti's cyberattack against Costa Rica's Ministerio de Hacienda 🇨🇷: "We will continue to attack the ministries of costa rica until its government pays us Attacks continue today" #ContiLeaks #Ransomware #RansomwareGroup…". Archived from the original on May 28, 2022. Retrieved June 8, 2022.
  44. ^ "Investigan si robaron información de correos del IMN". CRHoy.com (in Spanish). Archived from the original on April 19, 2022. Retrieved June 8, 2022.
  45. ^ "Costa Rica: Hackers rusos accesaron a servidores de correo del Meteorológico". www.estrategiaynegocios.net (in Spanish). Archived from the original on May 13, 2022. Retrieved June 8, 2022.
  46. ^ "Uživatel BetterCyber na Twitteru: "🚨 #Conti's latest update on the cyberattack against the Costa Rican Instituto Meteorologico Nacional: "The costa rica scenario is a beta version of a global cyber attack on an entire country" #Conti also claims to have hacked". Archived from the original on May 28, 2022. Retrieved June 8, 2022.
  47. ^ "BetterCyber Twitter'da: "🚨 #Conti publishes an additional ~5 GB of data allegedly belonging to the Ministerio de Hacienda of Costa Rica 🇨🇷... #Ransomware #RansomwareGroup #ContiLeaks…". Archived from the original on April 21, 2022. Retrieved June 8, 2022.
  48. ^ "Más instituciones bajo ataque de Conti, que aumenta presión a un gobierno con débil respuesta". El Financiero (in Spanish). Archived from the original on May 2, 2022. Retrieved June 8, 2022.
  49. ^ "Director de Gobernanza digital señala a Conti y afirma que hackeo está "bajo control"". CRHoy.com (in Spanish). Archived from the original on April 20, 2022. Retrieved June 8, 2022.
  50. ^ "Portal de Recursos Humanos de la CCSS es la nueva víctima del ataque de hackers". www.larepublica.net (in Spanish). Archived from the original on May 14, 2022. Retrieved June 8, 2022.
  51. ^ "Hackeo: CCSS enciende alerta ante posibles efectos en sus servicios esenciales". La Nación (in Spanish). Archived from the original on June 2, 2022. Retrieved June 8, 2022.
  52. ^ "CCSS sobre 'hackeo': 'No se extrajo información sensible' ni se afectó EDUS o Sicere". La Nación (in Spanish). Archived from the original on May 16, 2022. Retrieved June 8, 2022.
  53. ^ a b ""Estamos ante una situación de crimen organizado internacional y no estamos dispuestos a ninguna extorsión o pago"". delfino.cr (in Spanish). Archived from the original on April 21, 2022. Retrieved June 8, 2022.
  54. ^ "Ministerio de Trabajo y Fodesaf se suman a blancos de ataques informáticos • Semanario Universidad". semanariouniversidad.com (in Spanish). April 21, 2022. Archived from the original on June 9, 2022. Retrieved June 8, 2022.
  55. ^ "Hackers ofrecen descuento del 35% al Gobierno de Costa Rica y prometen no tocar al sector privado". www.larepublica.net (in Spanish). Archived from the original on May 19, 2022. Retrieved June 8, 2022.
  56. ^ "Conti anuncia publicación de toda la data robada a Costa Rica tras negativa del gobierno a pagar rescate". delfino.cr (in Spanish). Archived from the original on May 17, 2022. Retrieved June 8, 2022.
  57. ^ "Gobierno sostiene que no pagará ningún rescate pese a descuento ofrecido por ciberdelincuentes". delfino.cr (in Spanish). Archived from the original on April 22, 2022. Retrieved June 8, 2022.
  58. ^ "Alvarado: "Este ciberataque busca amenazar la estabilidad del país en una coyuntura de transición"". delfino.cr (in Spanish). Archived from the original on April 22, 2022. Retrieved June 8, 2022.
  59. ^ a b c "Gobierno firma directriz que fortalece las medidas de ciberseguridad del sector público". Presidencia de la República de Costa Rica (in Spanish). Archived from the original on May 18, 2022. Retrieved June 8, 2022.
  60. ^ "Micitt: "desde ayer no se han registrado nuevos incidentes informáticos"". delfino.cr (in Spanish). Archived from the original on April 22, 2022. Retrieved June 8, 2022.
  61. ^ "Jasec se convierte en la nueva víctima de Conti". CRHoy.com (in Spanish). Archived from the original on April 23, 2022. Retrieved June 8, 2022.
  62. ^ "Micitt: Ataque a Jasec pudo comprometer información de abonados". CRHoy.com (in Spanish). Archived from the original on April 23, 2022. Retrieved June 8, 2022.
  63. ^ "Datos personales de usuarios de Jasec pudieron ser robados por Conti, advierte el Gobierno". La Nación (in Spanish). Archived from the original on June 5, 2022. Retrieved June 8, 2022.
  64. ^ "Conti cifra sistemas de contabilidad y recursos humanos de Jasec, según Micitt". CRHoy.com (in Spanish). Archived from the original on April 24, 2022. Retrieved June 8, 2022.
  65. ^ "Conti "cambia de táctica": Ahora amenaza directamente al sector privado costarricense". CRHoy.com (in Spanish). Archived from the original on April 25, 2022. Retrieved June 8, 2022.
  66. ^ "'Hackers' atacan sede interuniversitaria de Alajuela y sistemas del Inder". La Nación (in Spanish). Archived from the original on May 16, 2022. Retrieved June 8, 2022.
  67. ^ "MEIC detectó a Conti en computadoras de usuarios, mientras que Micitt mantiene alerta sobre avisos recientes de los 'hackers'". El Financiero (in Spanish). Archived from the original on May 4, 2022. Retrieved June 8, 2022.
  68. ^ "Micitt detecta ciberataques de Conti en Fanal y en las municipalidades de Turrialba y Golfito". El Financiero (in Spanish). Archived from the original on May 4, 2022. Retrieved June 8, 2022.
  69. ^ "Autoridades confirman intentos de ciberataques en Ministerio de Justicia y JPS". Teletica. May 3, 2022. Archived from the original on May 4, 2022. Retrieved June 8, 2022.
  70. ^ "Ciber criminales apuntan a las municipalidades, Garabito y Alajuelita afectadas • Semanario Universidad". semanariouniversidad.com (in Spanish). May 2, 2022. Archived from the original on June 9, 2022. Retrieved June 8, 2022.
  71. ^ "JPS sufre ataque "aislado" de Conti; Gobierno asegura que está contenido". CRHoy.com (in Spanish). Archived from the original on May 3, 2022. Retrieved June 8, 2022.
  72. ^ "Costa Rica habilitará sistema tributario afectado por ciberataque" [Costa Rica will enable tax system affected by cyberattack]. Noticias de El Salvador - Noticias de El Salvador (in Spanish). EFE. Retrieved June 12, 2022.
  73. ^ "Costa Rica restablece plataforma de aduanas tras dos meses de ciberataque". SWI swissinfo.ch (in Spanish). Retrieved July 3, 2022.
  74. ^ "Sistema TICA de Hacienda vuelve a operar dos meses después de 'hackeo'". La Nación (in Spanish). Retrieved July 3, 2022.
  75. ^ "FOTOS Y VIDEO: Los extraños mensajes de las impresoras de la CCSS tras hackeo". CRHoy.com (in Spanish). Archived from the original on May 31, 2022. Retrieved June 8, 2022.
  76. ^ "Hive Ransomware Group, el grupo de cibercriminales que atacó la CCSS y tiene predilección por instituciones de salud". delfino.cr (in Spanish). Archived from the original on May 31, 2022. Retrieved June 8, 2022.
  77. ^ a b c "Hackeo a la CCSS: "Fue un ataque excepcionalmente violento", pero no se vulneraron bases de datos o sistemas críticos". delfino.cr (in Spanish). Archived from the original on May 31, 2022. Retrieved June 8, 2022.
  78. ^ "'Nos dijeron que nos llamarían para reprogramar', contó asegurada afectada por 'hackeo' en CCSS". La Nación (in Spanish). Archived from the original on June 8, 2022. Retrieved June 8, 2022.
  79. ^ "CCSS confirma alrededor de 30 servidores afectados por hackeo". CRHoy.com (in Spanish). Archived from the original on May 31, 2022. Retrieved June 8, 2022.
  80. ^ "Atención: Estos son los servicios afectados por hackeo en la CCSS". CRHoy.com (in Spanish). Archived from the original on May 31, 2022. Retrieved June 8, 2022.
  81. ^ "CCSS reportó afectación de 4.871 usuarios en 80 establecimientos de salud, tras hackeo a sistemas informáticos". delfino.cr (in Spanish). Archived from the original on June 4, 2022. Retrieved June 8, 2022.
  82. ^ "Más de 12 mil pacientes se quedaron sin atención médica en segundo día de 'hackeo' en la CCSS". CRHoy.com (in Spanish). Archived from the original on June 3, 2022. Retrieved June 8, 2022.
  83. ^ a b "CCSS investigará si hubo negligencia para prevenir hackeo a la institución". delfino.cr (in Spanish). Archived from the original on June 4, 2022. Retrieved June 8, 2022.
  84. ^ "Ciberdelicuentes piden $5 millones en bitcoins a la CCSS". delfino.cr (in Spanish). Archived from the original on June 4, 2022. Retrieved June 8, 2022.
  85. ^ "Supen suspende temporalmente la libre transferencia entre operadoras de pensiones". CRHoy.com (in Spanish). Archived from the original on June 4, 2022. Retrieved June 8, 2022.
  86. ^ "CCSS amplía el plazo para que patronos presenten planillas: se extenderá hasta el 10 de junio debido a hackeos". delfino.cr (in Spanish). Archived from the original on June 4, 2022. Retrieved June 8, 2022.
  87. ^ "Régimen de IVM habilita cuentas y correos para depósito y reporte de pago de créditos". delfino.cr (in Spanish). Archived from the original on June 4, 2022. Retrieved June 8, 2022.
  88. ^ "163 establecimientos de la CCSS habilitan líneas telefónicas para consultas de usuarios tras hackeo". delfino.cr (in Spanish). Archived from the original on June 4, 2022. Retrieved June 8, 2022.
  89. ^ "Rodrigo Chaves sobre ciberataques: "Estamos preparando un decreto de emergencia nacional"". delfino.cr (in Spanish). Archived from the original on May 31, 2022. Retrieved June 8, 2022.
  90. ^ "Cámaras empresariales piden declaratoria de emergencia nacional por situación en aduanas". delfino.cr (in Spanish). Archived from the original on May 31, 2022. Retrieved June 8, 2022.
  91. ^ "Sistema Costarricense de Información Jurídica". www.pgrweb.go.cr. Archived from the original on May 12, 2022. Retrieved June 8, 2022.
  92. ^ "Chaves afirma que país está en guerra por ataques cibernéticos y que habría ticos ayudando a Conti". delfino.cr (in Spanish). Archived from the original on May 31, 2022. Retrieved June 8, 2022.
  93. ^ "Hackeo de Conti ha afectado pagos de 12 mil docentes, MEP volverá a planilla manual para resolver crisis". delfino.cr (in Spanish). Archived from the original on May 31, 2022. Retrieved June 8, 2022.
  94. ^ "Gobierno acuerda sobrepago para cancelar salarios de educadores afectados por cibertaques". delfino.cr (in Spanish). Archived from the original on May 31, 2022. Retrieved June 8, 2022.
  95. ^ "Sala IV declara 'con lugar' más de 200 amparos contra el MEP por atraso en pago de salarios". delfino.cr. Archived from the original on May 31, 2022. Retrieved June 8, 2022.
  96. ^ "MEP y Hacienda pagan más 25 mil movimientos pendientes mediante planilla extraordinaria". www.mep.go.cr. Archived from the original on June 9, 2022. Retrieved June 8, 2022.
  97. ^ Tornaghi, Cecilia (July 25, 2023). "The Dramatic Cyberattack That Put Latin America on Alert". Americas Quarterly. Retrieved July 25, 2023.
  • v
  • t
  • e
Hacking in the 2020s
← 2010s Timeline 2030s →
Major incidents
2020
2021
2022
2023
2024
GroupsIndividualsMajor vulnerabilities
publicly disclosed
Malware
2020
2021
  • Predator
2022