WaterISAC Navigation
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
Home Community Partnerships Conti Ransomware and TrickBot Threat Actors Reportedly Merge Operational Activity
Become a Member

Log in

  • Upcoming Events
  • Resource Center
  • Tools
  • Webcasts
  • Contaminant Databases
  • Directory
  • About
  • Log in

  • My Account

  • Logout

  • Report Incident
  • Contact Us
  • NRWA Signup
  • WaterISAC Champions
More Resources

Conti Ransomware and TrickBot Threat Actors Reportedly Merge Operational Activity

Author: Alec Davison

Created: Tuesday, February 22, 2022 - 19:45

Categories: Cybersecurity

Security researchers at Advanced Intelligence (AdvIntel) believe threat actors associated with TrickBot malware have partnered with the Conti ransomware gang, according to a recent report. TrickBot is a highly modular, multi-stage malware that has been active since 2016. TrickBot has survived a takedown attempt and helped relaunch the Emotet malware. Conti ransomware emerged in 2020 and since then has prospered by attaining crime syndicate status, according to AdvIntel, amidst a global crackdown on cybercrime. Conti’s success was likely due to its partnership with TrickBot, according to the researchers. “The Emotet-TrickBot-Ryuk supply chain was extremely resilient. And with a stable and high-quality supply of accesses coming from a single organized source, Conti was able to maintain its image without any major structural changes.” The availability of Trickbot IOCs have made the malware more easily detectable, thus TrickBot members are now working with its stealthier replacement, BazarBackdoor. Access the full report at AdvIntel or read a relevant news article here.

Related Resources

(TLP:CLEAR) FIRESTARTER Backdoor and Updated Emergency Directive for CISCO Firepower and Secure Firewall Devices

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness
Members Only

(TLP:GREEN) FBI FLASH – Newly Observed Ransomware Variant Black Shrantac Threat to U.S. Entities

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness
Members Only

(TLP:AMBER+STRICT) Likely PRC State-Sponsored Activity Observed in the Water Sector – DocuSign Phishing Tactics Identified

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness

Become a Member
FAQs
About
Report Incident

Terms & Conditions
Privacy Policy
AI Policy
Contact Us

LinkedIn

1250 I Street NW, Suite 350
Washington, DC 20005
1-866-H2O-ISAC (1-866-426-4722)
© 2026 WaterISAC. All Rights Reserved.

Toggle the Widgetbar