BOOK THIS SPACE FOR AD
ARTICLE ADThe data includes IP addresses for Cobalt Strike C2 servers as well as an archive including numerous tools and training materials for the group, revealing how it performs attacks.
An apparently vengeful affiliate of the Conti Gang has leaked the playbook of the ransomware group after alleging that the notorious cybercriminal organization underpaid him for doing its dirty work.
A security researcher shared a comment from an online forum allegedly posted by someone who did business with Conti that included information integral to its ransomware-as-as-service (RaaS) operation, according to a report.
RaaS is a model in which an experienced ransomware developer creates and manages all the tools and infrastructure needed to perform attacks, while recruited affiliates do the actual heavy lifting. Usually they agree to be paid a percentage — typically 20 percent to 30 percent — of the ransom earned.
Apparently, the group didn’t pay one disgruntled affiliate as much as expected, leading to an online rant and a leak of key data representing “the holy grail of the pen-tester operation behind the Conti ransomware ‘pen-tester’ team from A-Z,” ethical hacker and security researcher Vitali Kremez said, according to the report.
Data revealed by the post included the IP addresses for the group’s Cobalt Strike command-and-control servers (C2s) and a 113MB archive that contains numerous tools and training material for how Conti performs ransomware attacks, according to the report, which was later verified by Kremez on Twitter.
The affiliate said he received only $1,500 for his work, grumbling that “they recruit suckers and divide the money among themselves.”
How to Defend Your Networks from Conti
Based on the leaked playbook, Kremez tweeted a warning for network administrators looking for Conti activity to “scan for unauthorized Atera Agent installations and Any Desk persistence:”
Warning!
🗣Scan for unauthorized Atera Agent installations and Any Desk persistence.
💥The #Conti adversaries install legit @AteraCloud RMM agent w/ one-day burner accounts to survive Cobalt Strike detects.
I confirm as we see Atera along Cobalt installations pre-ransomware https://t.co/wY3aIZkTK2
— Vitali Kremez (@VK_Intel) August 5, 2021
Kremez also told BleepingComputer that the playbook “matches the active cases for Conti as we see right now.”
Another security researcher, who goes by @Pancak3 on Twitter, advised everyone in a tweet to block several IP addresses to avoid attacks by the group, which were revealed in the data as ones being used by Conti:
🤫 go block these 🤫
162.244.80.235
85.93.88.165
185.141.63.120
82.118.21.1
— pancak3 (@pancak3lullz) August 5, 2021
Ransomware Rising
While the leak is a blow to the activities of the Conti operators, it also provides other threat actors tools they need to build up skills to conduct attacks of their own, Kremez told BleepingComputer.
“The implications are huge and allow new pen-tester ransomware operators to level up their pen-tester skills for ransomware, step-by-step,” he said, according to the report.
Overall, ransomware gangs have been on the run lately, with mounting pressures and crackdowns from international authorities that already have led to the shutdown of some key players, including REvil and DarkSide.
Meanwhile, new threat groups that may or may not have spawned from the previous ranks of these cybercriminal organizations are sliding in to fill the gaps they left. Haron and BlackMatter are among those that have emerged recently with intent to use ransomware to target large organizations that can pay million-dollar ransoms to fill their pockets.
Worried about where the next attack is coming from? We’ve got your back. REGISTER NOW for our upcoming live webinar, How to Think Like a Threat Actor, in partnership with Uptycs. Find out precisely where attackers are targeting you and how to get there first. Join host Becky Bracken and Uptycs researchers Amit Malik and Ashwin Vamshi on Aug. 17 at 11AM EST for this LIVE discussion.