Conti Ransomware Affiliate Attacks Australian Utilities Giant's Corporate Network

Stu Sjouwerman | Dec 29, 2021

Conti Ransomware Affiliate AttackWhile news reports indicate no impact to the utilities company’s ability to deliver electricity to its’ customers, this could be the start of attacks on critical infrastructure in Australia.

On November 27, Australian electricity giant, CS Energy released a statement indicating they had suffered a ransomware attack by a Conti ransomware affiliate. Early indications pointed to the attack coming from China, but there is no conclusive evidence that this was a nation-state attack.

According to an update on the situation, CS Energy indicated that cybersecurity safeguards designed to isolate the infected corporate from their operational network that is responsible for delivering electricity contained the attack, and that operations have been continuous throughout their response, as they continue to restore impacted systems.

The United States has had its’ fair share of attacks on critical infrastructure and utilities companies, causing response and action from the federal government. We will need to keep an eye collectively and see if this same attack trend follows suit into Australia.

In a recent Conti attack, threat actors used malicious Google Ads mixed with social engineering to trick users into engaging with malicious content that inevitably installed ZLoader – a delivery mechanism for Conti.

It’s critical for utilities companies around the world to realize the target that exists on their corporate back; threat actors see these kinds of companies as prime targets that may be more apt to pay a ransom to ensure needed services stay operational. One method includes enabling users to identify suspicious content before engaging with it through Security Awareness Training. By continually educating users on the scams, tactics, and campaigns used by cybercriminals, the likelihood of successful attack drops significantly.

Topics: Ransomware

Ransomware Simulator

Free downloadable software tool

Threat actors are constantly coming out with new strains to evade detection. Is your network effective in blocking all of them when employees fall for social engineering attacks?

RanSim gives you a quick look at the effectiveness of your existing network protection. RanSim will test 24 ransomware infection scenarios and 1 cryptomining infection scenario and show you if a workstation is vulnerable.

RansIm-Monitor3Here's how it works:

  • 100% harmless simulation of real ransomware and cryptomining infections
  • Does not use any of your own files
  • Tests 25 types of infection scenarios
  • Just download the installer and run it
  • Results in a few minutes!

Get RanSim!

Secure the Digital Workforce: Human + AI

KnowBe4 empowers the modern workforce to make smarter security decisions every day. Trusted by more than 70,000 organizations worldwide, KnowBe4 is the pioneer of digital workforce security, securing both AI agents and humans. The KnowBe4 Platform provides attack simulation and training, collaboration security, and agent security powered by AIDA (Artificial Intelligence Defense Agents) and a proprietary Risk Score. The platform leverages 15 years of behavioral data to combat advanced threats including social engineering, prompt injection, and shadow AI. By securing humans and agents, KnowBe4 leads the industry in workforce trust and defense.