On August 12, the US State Department announced a $10 million reward for alleged intelligence or additional information about any of the five members of the Conti hacker group, as well as Wizard Spider or Trickbot. The agency published the pseudonyms of cybercriminals and even showed the alleged image of one of the hackers or their assistants.
As the nicknames of the hackers, the US intelligence agencies indicated the following: Tramp, Dandis, Professor, Reshaev, and Target.
This is the first time the US government has released a photo of a suspect with alleged ties to the Conti group.
“We are trying to match the name with the face. To the guy in the photo: imagine how many cool hats you can buy for $ 10 million, ”the US State Department explained on the page with the award. In the image, an unknown person, judging by the poor quality of the picture, is wearing a bathing headdress in the form of a Budyonovka.
On July 25, the US Department of State increased the reward to $15 million for information that allows the identification of attackers and the location of Conti participants and management. US authorities have promised to pay $5 million for data that will allow the arrest of people who are in collusion with the group or trying to participate in its activities.
In relation to the activities of members of the Conti group, criminal cases have been opened in absentia in Ireland, Great Britain and the United States. US intelligence agencies believe that its main staff has not ceased operations and is based in St. Petersburg. Conti is accused of cyber attacks against the Irish National Health Service, the British jewelry house Graff and the infrastructure of government agencies in Costa Rica.
The hacker group Conti began its activity in 2019. Experts suggest that its leadership consists of highly professional developers from the Russian Federation who have decided to engage in digital extortion on a global scale. In the course of its activities, Conti has partnered with other hacker communities including HelloKitty, Hive, BlackCat, BlackByte Karakurt, AvosLocker, and Bazarcall.
On May 10, the US State Department announced a $10 million reward for information about the whereabouts of Conti members and management, and $5 million for data on hacker partners.
On May 20, the Conti Ransomware group ended its activities and disbanded its infrastructure. The band's official website has been closed. Since the beginning of 2022, Conti has published data on 156 companies attacked by the group, according to a Group-IB report. In total, the list of victims of the hacker group includes over 850 organizations from various industries, as well as government departments in many countries.