Navigation X
ALERT
Click here to register with a few steps and explore all our cool stuff we have to offer!



   7509

Conti Ransomware training material and tools leaked by an affiliate

by Mastiff - 21 August, 2021 - 10:00 AM
This post is by a banned member (scorpion0420) - Unhide
107
Posts
0
Threads
3 Years of service
#65
(23 August, 2021 - 04:37 PM)ransomerx Wrote: Show More
im corious thanks

dw
This post is by a banned member (kel777) - Unhide
kel777  
Registered
51
Posts
0
Threads
2 Years of service
#66
thanks
This post is by a banned member (downloadedom) - Unhide
286
Posts
32
Threads
1 Year of service
#67
im interested [Image: popcorn2.gif]
This post is by a banned member (furnato815) - Unhide
44
Posts
0
Threads
1 Year of service
#68
sadfadada
This post is by a banned member (exterm1n4tor) - Unhide
21
Posts
0
Threads
3 Years of service
#69
(21 August, 2021 - 10:00 AM)Mastiff Wrote: Show More
A disgruntled Conti affiliate has leaked the gang's training material when conducting attacks, including information about one of the ransomware's operators.

The Conti Ransomware operation is run as a ransomware-as-a-service (RaaS), where the core team manages the malware and Tor sites, while recruited affiliates perform network breaches and encrypt devices. As part of this arrangement, the core team earns 20-30% of a ransom payment, while the affiliates earn the rest.

Today, a security researcher shared a forum post created by an angry Conti affiliate who publicly leaked information about the ransomware operation. This information includes the IP addresses for Cobalt Strike C2 servers and a 113 MB archive containing numerous tools and training material for conducting ransomware attacks.

thx
This post is by a banned member (gr33nGh0st) - Unhide
1
Posts
0
Threads
1 Year of service
#70
Excelent. This is very useful
This post is by a banned member (gujalaant) - Unhide
gujalaant  
Registered
4
Posts
0
Threads
1 Year of service
#71
lmme see this
This post is by a banned member (blankofthe2) - Unhide
75
Posts
0
Threads
1 Year of service
#72
(21 August, 2021 - 10:00 AM)Mastiff Wrote: Show More
A disgruntled Conti affiliate has leaked the gang's training material when conducting attacks, including information about one of the ransomware's operators.

The Conti Ransomware operation is run as a ransomware-as-a-service (RaaS), where the core team manages the malware and Tor sites, while recruited affiliates perform network breaches and encrypt devices. As part of this arrangement, the core team earns 20-30% of a ransom payment, while the affiliates earn the rest.

Today, a security researcher shared a forum post created by an angry Conti affiliate who publicly leaked information about the ransomware operation. This information includes the IP addresses for Cobalt Strike C2 servers and a 113 MB archive containing numerous tools and training material for conducting ransomware attacks.

fgdgfdgdf

Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
or
Sign in
Already have an account? Sign in here.


Forum Jump:


Users browsing this thread: 1 Guest(s)