This post is by a banned member (scorpion0420) - Unhide
31 May, 2024 - 12:21 AM
Reply
(23 August, 2021 - 04:37 PM)ransomerx Wrote: Show Moreim corious thanks
dw
This post is by a banned member (kel777) - Unhide
01 June, 2024 - 10:53 PM
Reply
This post is by a banned member (downloadedom) - Unhide
03 July, 2024 - 01:04 PM
Reply
im interested
This post is by a banned member (furnato815) - Unhide
11 July, 2024 - 05:53 PM
Reply
This post is by a banned member (exterm1n4tor) - Unhide
12 July, 2024 - 04:52 PM
Reply
(21 August, 2021 - 10:00 AM)Mastiff Wrote: Show MoreA disgruntled Conti affiliate has leaked the gang's training material when conducting attacks, including information about one of the ransomware's operators.
The Conti Ransomware operation is run as a ransomware-as-a-service (RaaS), where the core team manages the malware and Tor sites, while recruited affiliates perform network breaches and encrypt devices. As part of this arrangement, the core team earns 20-30% of a ransom payment, while the affiliates earn the rest.
Today, a security researcher shared a forum post created by an angry Conti affiliate who publicly leaked information about the ransomware operation. This information includes the IP addresses for Cobalt Strike C2 servers and a 113 MB archive containing numerous tools and training material for conducting ransomware attacks.
thx
This post is by a banned member (gr33nGh0st) - Unhide
17 July, 2024 - 07:01 AM
Reply
Excelent. This is very useful
This post is by a banned member (gujalaant) - Unhide
19 July, 2024 - 12:55 AM
Reply
This post is by a banned member (blankofthe2) - Unhide
14 August, 2024 - 09:51 PM
Reply
(21 August, 2021 - 10:00 AM)Mastiff Wrote: Show MoreA disgruntled Conti affiliate has leaked the gang's training material when conducting attacks, including information about one of the ransomware's operators.
The Conti Ransomware operation is run as a ransomware-as-a-service (RaaS), where the core team manages the malware and Tor sites, while recruited affiliates perform network breaches and encrypt devices. As part of this arrangement, the core team earns 20-30% of a ransom payment, while the affiliates earn the rest.
Today, a security researcher shared a forum post created by an angry Conti affiliate who publicly leaked information about the ransomware operation. This information includes the IP addresses for Cobalt Strike C2 servers and a 113 MB archive containing numerous tools and training material for conducting ransomware attacks.
fgdgfdgdf