All cases

Costa Rica Government Ransomware Attack

April – May 2022

RansomwarePeak: DegradationAttribution: High ConfidenceGovernmentFinanceHealthcare
Year
2022
Actor country
Russia (criminal, not directly state-sponsored per public assessments)
Target regions
Costa Rica
Unpeace score
8

Executive Summary

Conti ransomware group attacked multiple Costa Rican government ministries, encrypting systems at the Ministry of Finance, disabling tax and customs platforms, and demanding a $20M ransom (later reduced to $10M). Costa Rica declared a national emergency — the first country to do so in response to a ransomware attack. A follow-on attack attributed to HIVE targeted the social security healthcare system weeks later.

Why This Matters

Costa Rica showed that ransomware can effectively disable a nation's fiscal and health systems, forcing the first-ever national emergency declaration over a cyber attack and elevating ransomware to a sovereign-level threat.

Escalation Profile

7-Dimension Profile

Escalation Ladder

Probing
Intrusion
Disruption
Degradation
Destruction
Strategic

Phases

2022-04-12
Intrusion

Initial government network compromise

Conti gained access to the Ministry of Finance network, exfiltrating data and pre-positioning for encryption.

2022-04-18
Disruption

Multi-ministry encryption

Tax collection, customs, and import/export systems taken offline; ~672 GB of government data exfiltrated and partially leaked.

2022-05-08
Degradation

National emergency declaration

President Chaves declared a national emergency; HIVE subsequently attacked the social security health system (CCSS), disrupting hospital operations.

Threshold Crossings

  • First country to declare a national emergency over ransomware
  • Demonstrated that ransomware can functionally incapacitate the fiscal apparatus of a nation-state

Restraint Factors

  • Attackers offered decryption for ransom — coercive but not purely destructive
  • No reported impact on life-safety systems

Attribution Assessment

High ConfidenceConti ransomware group (Russian-speaking criminal organization); follow-on attack attributed to HIVE
Russia (criminal, not directly state-sponsored per public assessments)
ContiWizard SpiderHIVE
1. Technical

Threat actor mapped to Russia (criminal, not directly state-sponsored per public assessments) based on infrastructure analysis, malware attribution, and operational patterns.

2. Political / Legal
Sanctions Imposed
  • US offered $10M reward for information on Conti leadership
  • US and allied assistance to Costa Rica for incident response
  • Counter Ransomware Initiative (CRI) coalition cited Costa Rica as motivating case

Sources: Costa Rica Presidential Decree of National Emergency; US State Department: Reward Offer for Conti Leadership; CISA: Conti Ransomware Advisory AA21-265A (updated)

3. Open Source

No dedicated journalistic sources in dataset. See sources section for full references.

High Confidence” reflects available public evidence. All assessments carry inherent uncertainty and should be read alongside source material.

Unpeace Position

8

Unpeace Score

Composite severity rating on the peace–conflict spectrum

Stable
Contested
Escalatory
03060100

Contributing Dimensions

Escalation peak4/6
Threshold crossings2/4
Governance flags3/8
Sectors affected3/6
Entanglement5/10
Country scope1/6

Coercive Function

Ransomware

Denial of access through encryption — coercive value through economic extortion and operational disruption.

Observed coercive effects

  • First country to declare a national emergency over ransomware
  • Demonstrated that ransomware can functionally incapacitate the fiscal apparatus of a nation-state

Entanglement Risk

Entanglement score5

Sectors affected

GovernmentFinanceHealthcare

Countries / regions

Costa Rica

Impact summary

Tax and customs systems offline for weeks; national emergency declared; healthcare disrupted by follow-on attack.

Infrastructure Meaning

Malware / tooling

ContiHIVE

Capability profile

Tax and customs systems offline for weeks; national emergency declared; healthcare disrupted by follow-on attack.

3 ATT&CK techniques mapped — see ATT&CK mapping below.

Governance Analysis

Governance Flags

!Norm Violation
APublic Attribution
SSanctions Imposed
IIndictment
UUN Discussion
RRegulatory Change
CInternational Cooperation
DDeterrence Signal

Norms invoked

  • Protection of government services and public welfare infrastructure
  • Responsible state behavior: preventing criminal groups from operating with impunity

Policy responses

  • US offered $10M reward for information on Conti leadership
  • US and allied assistance to Costa Rica for incident response
  • Counter Ransomware Initiative (CRI) coalition cited Costa Rica as motivating case

Regulatory changes

  • Costa Rica accelerated national cybersecurity strategy and institutional reforms
  • Reinforced international momentum for the Counter Ransomware Initiative

Governance impact assessment

Made the strategic threat of ransomware to sovereign governance undeniable, strengthening the case for treating ransomware groups as national security threats rather than mere criminal nuisances.

Sources

G

Costa Rica Presidential Decree of National Emergency

Government2022-05-08
G

US State Department: Reward Offer for Conti Leadership

Government2022-05-06
G

CISA: Conti Ransomware Advisory AA21-265A (updated)

Government2022-04

Sources listed reflect publicly available materials used to construct this case entry. Inclusion does not imply endorsement. Where no URL is provided, the source may be found via its title and date.