Governance

US Offers $10 Million Bounty on Conti Ransomware Gang

The U.S. State Department has announced a USD 10 million bounty for anyone who can identify the five Conti ransomware gang members. The news comes directly from the ‘Rewards for Justice’ Twitter handle, stating that the U.S. Government has revealed the face of the first gang member through a surveillance camera. Anyone who can confirm the hacker’s identity and assist the authorities in identifying the other members will get a reward of USD 10 million from the U.S. State Department.

U.S. government reveals the bounty and Conti members’ names

In the featured video within the Tweet, the Rewards of Justice, an official program by the U.S. government to provide monetary rewards to people who provide information related to threat actors, stated, “If you have information that ties hacking groups such as Conti, TrickBot, Wizard Spider; the hackers known as “Tramp,” “Dandis,” “Professor,” “Reshaev,” or “Target”; or any malware or ransomware to a foreign government targeting U.S. critical infrastructure, you may be eligible for a reward.”

The Tweet also asked people to send relevant information about the hackers to RFJ using a Tor-based tip line. The U.S. government is willing to pay a bounty amount of USD 10 million for successful leads.

The wrecking of Conti ransomware

Conti is a powerful ransomware behind many high-profile cyber-attacks, including the famous data theft of Graff, a premium London-based jewelry brand. It has also infiltrated various high-security organizations like C.S. Energy and internet of things (IIoT) chip maker Advantech. The malware is still a serious TA (Threat Actor) in the United States and is said to have amassed over $150 million in ransom payments from various businesses.

The ransomware has previously compromised many US-related industries and cities, including Broward County Public Schools in Florida, Advantech, and the City of Tulsa. All these attacks became more prominent as the hacker group tried igniting a war-like situation in Russia and Ukraine. In a leaked data of over 170,000 internal chat conversations between Conti members, the cybersecurity specialist, and government agencies were able to list down five important members of the group — Tramp, Dandis, Professor, Reshaev, and Target, who might still be running the Conti group despite it being closed after it sided with Russia over the invasion of Ukraine.

thecyberexpress

View Comments

Recent Posts

The Cyber Express Weekly Roundup: AI Disruption, Regulatory Pressure, and the Evolving Cyber Threat Landscape

AI fraud, deepfake probes, SME cyber warnings, and ransomware cases highlight rising global risks in this week’s Cyber Express roundup.

2 days ago

French National Bank Authority Breach Exposed 1.2 Million Accounts

French national bank authority confirmed a major data breach affecting 1.2 million bank accounts after a malicious actor stole credentials…

3 days ago

What Big Tech Leaders Said On AI’s Future at India AI Impact Summit 2026

The real success of AI will not only depend on how powerful the technology becomes, but on how safely, fairly,…

3 days ago

Two Petabytes Worth Data of Israeli’s Siphoned, Says Cyber Head

Israel data breach totals two petabytes, with phishing up 35% and cyber influence attacks rising 170%, says Yossi Karadi.

3 days ago

Cyberattack Forces Clinic Closures, Surgery Cancellations at University of Mississippi Medical Center

The UMMC cyberattack halted surgeries, closed clinics statewide and triggered a federal probe into potential patient data exposure.

3 days ago

First Android Malware Weaponizes Gemini AI to Evade Detection, Maintain Persistence

ESET researchers discovered PromptSpy, the first known Android malware to integrate generative AI directly into its execution flow, marking a…

3 days ago

This website uses cookies. By continuing to use this website you are giving consent to cookies being used.

Read More