{
	"id": "086bd5bd-3cd6-4947-ae36-047d0061a51a",
	"created_at": "2026-04-06T00:12:40.949457Z",
	"updated_at": "2026-04-10T03:23:51.41311Z",
	"deleted_at": null,
	"sha1_hash": "d7f7d3ba56e2f36ca0ab64ca9a1488f1ab040dd8",
	"title": "Conti ransomware claims to have hacked Peru MOF – Dirección General de Inteligencia (DIGIMIN)",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 235396,
	"plain_text": "Conti ransomware claims to have hacked Peru MOF – Dirección\r\nGeneral de Inteligencia (DIGIMIN)\r\nBy Pierluigi Paganini\r\nPublished: 2022-05-08 · Archived: 2026-04-05 21:16:28 UTC\r\nConti Ransomware gang claims to have hacked the Peru MOF – Dirección\r\nGeneral de Inteligencia (DIGIMIN) and stolen 9.41 GB.\r\nThe Conti ransomware gang added the Peru MOF – Dirección General de Inteligencia (DIGIMIN) to the list of its\r\nvictims on its Tor leak site. The National Directorate of Intelligence is the premier intelligence agency in Peru.\r\nThe agency is responsible for national, military and police intelligence, as well as counterintelligence. The\r\nransomware gang claimed to have stolen 9.41 GB of data.\r\nAt the time of this writing, the website of the Peru DIGIMIN is not reachable.\r\nhttps://securityaffairs.co/wordpress/131093/cyber-crime/conti-ransomware-peru-direccion-general-de-inteligencia.html\r\nPage 1 of 3\n\nClearly, an attack against an intelligence agency could lead to the disclosure of secret and confidential documents\r\nand pose a risk to national security.\r\nLast week, the US Department of State offered up to $15 million for information that helps identify and locate\r\nleadership and co-conspirators of the Conti ransomware gang.\r\nThe reward is offered under the Department of State’s Transnational Organized Crime Rewards Program\r\n(TOCRP).\r\nThe authorities are offering up to $10 million for information that could allow identifying individuals who hold a\r\nkey leadership position in the Conti ransomware gang, while an additional $5 million are offered for information\r\nthat could lead to the arrest and/or conviction of any individual in any country conspiring to participate in or\r\nattempting to participate in a Conti variant ransomware incident.\r\nPlease vote for Security Affairs as the best European Cybersecurity Blogger Awards 2022 –\r\nVOTE FOR YOUR WINNERS\r\nVote for me in the sections “The Underdogs – Best Personal (non-commercial) Security Blog” and\r\n“The Tech Whizz – Best Technical Blog” and others of your choice.\r\nTo nominate, please visit: https://docs.google.com/forms/d/e/1FAIpQLSfxxrxICiMZ9QM9iiPuMQIC-IoM-NpQMOsFZnJXrBQRYJGCOw/viewform  \r\nFollow me on Twitter: @securityaffairs and Facebook\r\n[adrotate banner=”9″] [adrotate banner=”12″]\r\nPierluigi Paganini\r\nhttps://securityaffairs.co/wordpress/131093/cyber-crime/conti-ransomware-peru-direccion-general-de-inteligencia.html\r\nPage 2 of 3\n\n(SecurityAffairs – hacking, Peru)\r\n[adrotate banner=”5″]\r\n[adrotate banner=”13″]\r\nSource: https://securityaffairs.co/wordpress/131093/cyber-crime/conti-ransomware-peru-direccion-general-de-inteligencia.html\r\nhttps://securityaffairs.co/wordpress/131093/cyber-crime/conti-ransomware-peru-direccion-general-de-inteligencia.html\r\nPage 3 of 3",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"ETDA"
	],
	"references": [
		"https://securityaffairs.co/wordpress/131093/cyber-crime/conti-ransomware-peru-direccion-general-de-inteligencia.html"
	],
	"report_names": [
		"conti-ransomware-peru-direccion-general-de-inteligencia.html"
	],
	"threat_actors": [
		{
			"id": "d90307b6-14a9-4d0b-9156-89e453d6eb13",
			"created_at": "2022-10-25T16:07:23.773944Z",
			"updated_at": "2026-04-10T02:00:04.746188Z",
			"deleted_at": null,
			"main_name": "Lead",
			"aliases": [
				"Casper",
				"TG-3279"
			],
			"source_name": "ETDA:Lead",
			"tools": [
				"Agentemis",
				"BleDoor",
				"Cobalt Strike",
				"CobaltStrike",
				"RbDoor",
				"RibDoor",
				"Winnti",
				"cobeacon"
			],
			"source_id": "ETDA",
			"reports": null
		}
	],
	"ts_created_at": 1775434360,
	"ts_updated_at": 1775791431,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/d7f7d3ba56e2f36ca0ab64ca9a1488f1ab040dd8.pdf",
		"text": "https://archive.orkl.eu/d7f7d3ba56e2f36ca0ab64ca9a1488f1ab040dd8.txt",
		"img": "https://archive.orkl.eu/d7f7d3ba56e2f36ca0ab64ca9a1488f1ab040dd8.jpg"
	}
}