Disgruntled Conti Ransomware Affiliate Leaks Info on Gang

In a dog eat dog turn of events, an affiliate working for the Conti ransomware gang has leaked information on the criminal group's methodology and operations. The affiliate was apparently angry because the Conti gang undercut his payment.

The Conti ransomware gang operates using a ransomware-as-service model - something that has become almost the norm when it comes to larger criminal organizations who deal in ransomware. The model constitutes a sort of an illegal revenue sharing plan where the affiliates execute the attacks and then split any ransom money paid with the hackers who set up and run the ransomware and its infrastructure.

A security researcher caught the post made by the angered Conti gang affiliate on an underground forum. The affiliate posted a significant infodump on the gang's operations and the way they operate. The information disclosed in the post included addresses of CobaltStrike command and control servers used by Conti, as well as an archive file that contains tutorial materials that Conti uses for new affiliates and other assorted tools.

The revenue share that takes place between the ransom group operating the infrastructure and their affiliates can vary but the split the affiliates receive is usually in the ballpark of 20 to 30 percent. In this case, the angry affiliate only received $1,500 and accused Conti of looking for "suckers" to do the dirty work for them without receiving their promised cut.

On the basis of the information, tools and training materials leaked, researcher Vitali Kremez tweeted out a couple of security tips on how to protect networks from Conti ransomware. Those included scanning systems for "unauthorized Atera Agent installations" and checking for Any Desk persistence. Atera was one of the tools that Conti use alongside CobaltStrike beacons before they move on to deploy the final payload of the ransomware.

A separate researcher tweeted out a set of IPs associated with Conti to be blocked immediately to improve security. The batch included the following:

162.244.80.235

85.93.88.165

185.141.63.120

82.118.21.1

Those are the same addresses that showed up in the forum leak as used by the Conti gang.

August 9, 2021
Loading...

Cyclonis Password Manager Details & Terms

FREE Trial: 30-Day One-Time Offer! No credit card required for Free Trial. Full functionality for the length of the Free Trial. (Full functionality after Free Trial requires subscription purchase.) To learn more about our policies and pricing, see EULA, Privacy Policy, Discount Terms and Purchase Page. If you wish to uninstall the app, please visit the Uninstallation Instructions page.