DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Reward Offers for Information to Bring Conti Ransomware Variant Co-Conspirators to Justice

Posted on May 6, 2022 by Dissent

The Department of State is offering a reward of up to $10,000,000 for information leading to the identification and/or location of any individual(s) who hold a key leadership position in the Conti ransomware variant transnational organized crime group.  In addition, the Department is also offering a reward of up to $5,000,000 for information leading to the arrest and/or conviction of any individual in any country conspiring to participate in or attempting to participate in a Conti variant ransomware incident.

The Conti ransomware group has been responsible for hundreds of ransomware incidents over the past two years.  The FBI estimates that as of January 2022, there had been over 1,000 victims of attacks associated with Conti ransomware with victim payouts exceeding $150,000,000, making the Conti Ransomware variant the costliest strain of ransomware ever documented.  In April 2022, the group perpetrated a ransomware incident against the Government of Costa Rica that severely impacted the country’s foreign trade by disrupting its customs and taxes platforms.  In offering this reward, the United States demonstrates its commitment to protecting potential ransomware victims around the world from exploitation by cyber criminals.  We look to partner with nations willing to bring justice for those victims affected by ransomware.

This reward is offered under the Department of State’s Transnational Organized Crime Rewards Program (TOCRP).

The Department manages the TOCRP in close coordination with our federal law enforcement partners as part of a whole of government effort to disrupt and dismantle transnational organized crime globally, including cybercrime.  More than 75 transnational criminals and major narcotics traffickers have been brought to justice under the TOCRP and the Narcotics Rewards Program (NRP) since 1986.  The Department has paid more than $135 million in rewards under these programs to date.

For more information on the group listed above and the TOCRP, please see Department of State INL Transnational Organized Crime Rewards.

Source: U.S. Department of State


Related:

  • Two more entities have folded after ransomware attacks
  • British institutions to be banned from paying ransoms to Russian hackers
  • Global hack on Microsoft product hits U.S., state agencies, researchers say
  • Authorities released free decryptor for Phobos and 8base ransomware
  • More than 100 British government personnel exposed by Ministry of Defence data leak
  • Armenian National Extradited to the United States Faces Federal Charges for Ransomware Extortion Conspiracy
Category: MalwareOf Note

Post navigation

← Two States Enact Insurance Data Security Laws
IKEA Canada confirms data breach involving personal information of approximately 95,000 customers →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Hackers leak purported Aeroflot data as Russia denies breach
  • Palo Alto Networks investigating ransomware threat related to SharePoint exploitation
  • Six months after discovering an attack, Northwest Radiologists notifies almost 350,000 Washington State residents
  • As ransomware gangs threaten physical harm, ‘I am afraid of what’s next,’ ex-negotiator says
  • Dermatology Clinics Affected by Practice Management Company Data Breach
  • UK: Physiotherapist who accessed patient’s personal data to visit her home is struck off
  • Genoa Community Hospital discloses breach discovered in March
  • In Singapore, 147,000 customer records exposed in Cycle & Carriage data breach
  • New adult safeguarding toolkit to help protect vulnerable adults’ data
  • Hacker Arrested for Data Theft Targeting Spanish Bank Customers

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Nebraska Attorney General Sues GM and OnStar Over Alleged Privacy Violations
  • Federal Court Allows Privacy Related Claims to Proceed in a Proposed Class Action Lawsuit Against Motorola
  • Italian Garante Adopts Statement on Health Data and AI
  • Trump administration is launching a new private health tracking system with Big Tech’s help
  • Attorney General James Takes Action to Protect Sensitive Personal Information of Tens of Millions of People
  • Searches of Your Private Data in the Cloud Amount to Illicit State Action
  • How a Tax Subpoena in Ohio Tests European Privacy Law

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.