{"id":128300,"date":"2021-09-29T17:23:41","date_gmt":"2021-09-30T00:23:41","guid":{"rendered":"https:\/\/lifeboat.com\/blog\/2021\/09\/conti-ransomware-expands-ability-to-blow-up-backups"},"modified":"2021-09-29T17:23:41","modified_gmt":"2021-09-30T00:23:41","slug":"conti-ransomware-expands-ability-to-blow-up-backups","status":"publish","type":"post","link":"https:\/\/lifeboat.com\/blog\/2021\/09\/conti-ransomware-expands-ability-to-blow-up-backups","title":{"rendered":"Conti Ransomware Expands Ability to Blow Up Backups"},"content":{"rendered":"<p><a class=\"aligncenter blog-photo\" href=\"https:\/\/lifeboat.com\/blog.images\/conti-ransomware-expands-ability-to-blow-up-backups2.jpg\"><\/a><\/p>\n<p>The Conti ransomware gang has developed novel tactics to demolish backups, especially the Veeam recovery software.<\/p>\n<p>Good at identifying and obliterating backups? Speak Russian? The notorious Conti ransomware <a href=\"https:\/\/threatpost.com\/affiliate-leaks-conti-ransomware-playbook\/168442\/\" target=\"_blank\" rel=\"noopener\">group<\/a> may find you a fine hiring prospect.<\/p>\n<p>That\u2019s according to a <a href=\"https:\/\/www.advintel.io\/post\/backup-removal-solutions-from-conti-ransomware-with-love\" target=\"_blank\" rel=\"noopener\">report<\/a> published on Wednesday by cyber-risk prevention firm Advanced Intelligence, which details how Conti has honed its backup destruction to a fine art \u2013 all the better to find, crush and kill backed-up data. After all, backups are a major obstacle to encouraging ransomware payment.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Conti ransomware gang has developed novel tactics to demolish backups, especially the Veeam recovery software. Good at identifying and obliterating backups? Speak Russian? The notorious Conti ransomware group may find you a fine hiring prospect. That\u2019s according to a report published on Wednesday by cyber-risk prevention firm Advanced Intelligence, which details how Conti has [\u2026]<\/p>\n","protected":false},"author":396,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[34],"tags":[],"class_list":["post-128300","post","type-post","status-publish","format-standard","hentry","category-cybercrime-malcode"],"_links":{"self":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/128300","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/users\/396"}],"replies":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/comments?post=128300"}],"version-history":[{"count":0,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/128300\/revisions"}],"wp:attachment":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/media?parent=128300"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/categories?post=128300"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/tags?post=128300"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}