Security News > 2021 > August > Angry Conti ransomware affiliate leaks gang's attack playbook

A disgruntled Conti affiliate has leaked the gang's training material when conducting attacks, including information about one of the ransomware's operators.
The Conti Ransomware operation is run as a ransomware-as-a-service, where the core team manages the malware and Tor sites, while recruited affiliates perform network breaches and encrypt devices.
Today, a security researcher shared a forum post created by an angry Conti affiliate who publicly leaked information about the ransomware operation.
Attached to the above post are images of Cobalt Strike beacon configurations that contain the IP addresses for command and control servers used by the ransomware gang.
In a subsequent post, the affiliate shared an archive containing 111 MB of files, including hacking tools, manuals written in Russian, training material, and help documents that are allegedly provided to affiliates when performing Conti ransomware attacks.
"By and large, it is the holy grail of the pentester operation behind the Conti ransomware"pentester" team from A-Z. The implications are huge and allow new pentester ransomware operators to level up their pentester skills for ransomware step by step.
News URL
Related news
- Qilin ransomware claims attack at Lee Enterprises, leaks stolen data (source)
- Interlock ransomware claims DaVita attack, leaks stolen data (source)
- Ransomware gangs exploit Paragon Partition Manager bug in BYOVD attacks (source)
- Hackers Exploit Paragon Partition Manager Driver Vulnerability in Ransomware Attacks (source)
- Hunters International ransomware claims attack on Tata Technologies (source)
- Ransomware thugs threaten Tata Technologies with leak if demands not met (source)
- Toronto Zoo shares update on last year's ransomware attack (source)
- Ransomware gang creates tool to automate VPN brute-force attacks (source)
- SANS Institute Warns of Novel Cloud-Native Ransomware Attacks (source)
- ⚡ THN Weekly Recap: Router Hacks, PyPI Attacks, New Ransomware Decryptor, and More (source)