Customize Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.

The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ... 

Always Active

Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.

No cookies to display.

Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.

No cookies to display.

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.

No cookies to display.

Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.

No cookies to display.

Advertisement cookies are used to provide visitors with customized advertisements based on the pages you visited previously and to analyze the effectiveness of the ad campaigns.

No cookies to display.

Angry Affiliate Leaks Conti Ransomware Gang Methods!

Angry Affiliate Leaks Conti Ransomware Gang Methods!

A seemingly vengeful affiliate of the Conti Gang has leaked the playbook of the ransomware group after alleging that the notorious cyber-criminal organisation underpaid him for doing its work.

The data includes IP addresses for Cobalt Strike C2 servers as well as an archive including numerous tools & training materials for the group, revealing how it performs attacks.

Ransomware Developer

A security researcher shared a comment from an online forum allegedly posted by someone who did business with Conti that included information integral to its ransomware-as-as-service (RaaS) operation, according to a report.

RaaS is a model in which an experienced ransomware developer creates & manages all the tools & infrastructure needed to perform attacks, while recruited affiliates do the actual work. Usually, they agree to be paid a percentage — typically 20-30% of the ransom earned.

Holy Grail

Apparently, the group didn’t pay a disgruntled affiliate as much as expected, leading to an online rant & a leak of key data representing “the holy grail of the pen-tester operation behind the Conti ransomware ‘pen-tester’ team from A-Z,” ethical hacker & Security Researcher Vitali Kremez stated, according to the report.

Data revealed by the post included the IP addresses for the group’s Cobalt Strike command-&-control servers (C2s) & a 113mb archive that contains numerous tools & training material for how Conti performs ransomware attacks, according to the report, which was later verified by Kremez on Twitter.

The affiliate claimed he received only $1,500 for his work, grumbling that “they recruit suckers & divide the money among themselves.”

Defend Your Networks from Conti

Based on the leaked playbook, Kremez tweeted a warning for network administrators looking for Conti activity to “scan for unauthorised Atera Agent installations & Any Desk persistence:”

Kremez also told Bleeping Computer that the playbook “matches the active cases for Conti as we see right now.”

Another security researcher, who goes by @Pancak3 on Twitter, advised everyone in a tweet to block several IP addresses to avoid attacks by the group, which were revealed in the data as ones being used by Conti:

Ransomware Rising

While the leak is a blow to the activities of the Conti operators, it also provides other threat actors tools they need to build up skills to conduct attacks of their own, Kremez told Bleeping Computer.

“The implications are huge & allow new pen-tester ransomware operators to level up their pen-tester skills for ransomware, step-by-step,” he explained, according to the report.

International Authorities

Overall, ransomware gangs have been on the run lately, with mounting pressures & crackdowns from international authorities that already have led to the shutdown of some key players, including REvil & DarkSide.

Meanwhile, new threat groups that may or may not have spawned from the previous ranks of these cybercriminal organisations are sliding in to fill the gaps they left.

Haron & Black Matter are among those that have emerged recently with intent to use ransomware to target large organisations that can pay million-dollar ransoms to fill their pockets.

https://www.cybernewsgroup.co.uk/virtual-conference-september-2021/

 

SHARE ARTICLE