Post Now
Image

An avenging affiliate of the Conti Gang leaked the training material of the ransomware group, including data about one of the ransomware’s operators.)

  • A Conti affiliate leaked the playbook provided by the group to the customers of its RaaS.
  • The fellow was disappointed with the small payment he received from the Conti gang.

An avenging affiliate of the Conti Gang leaked the training material of the ransomware group, including data about one of the ransomware’s operators.

The Conti Ransomware operation is operated as a ransomware-as-a-service (RaaS), where the core team manages the malware and Tor sites. At the same time, recruited affiliates perform network breaches and encrypt devices.

Bleeping Computer reports that a security researcher shared a post created by an angry Conti affiliate who publicly leaked information about the ransomware operation. This data includes the IP addresses for Cobalt Strike command-and-control servers (C2s) and a 113 MB archive containing multiple tools and training material for conducting ransomware attacks.

According to the report, ethical hacker and security researcher Vitali Kremez said the group didn’t pay one disappointed affiliate as much as expected, leading to an online rant and a leak of key data representing “the holy grail of the pen-tester operation behind the Conti ransomware ‘pen-tester' team from A-Z.” 

"I merge you their IP-address of cobalt servers and type of training materials. 1500 $ yes, of course, they recruit suckers and divide the money among themselves, and the boys are fed with what they will let them know when the victim pays," the affiliate posted to a popular Russian-speaking hacking forum.

Administrators should shut off every connection with the servers used by the gang and reveal angry affiliates.

The affiliate also published another post containing an archive of 111 MB containing hacking tools, manuals in the Russian language, and other documents used to instruct affiliates.

For the latest cyber threats and the latest hacking news please follow us on FacebookLinkedin, and Twitter.

You may be interested in reading: How to Survive the COVID Time Cyber ​​Security Threats?