Cybercrime

Disgruntled ransomware affiliate leaks the Conti gang’s technical manuals

A disgruntled member of the Conti ransomware program has leaked today the manuals and technical guides used by the Conti gang to train affiliate members on how to access, move laterally, and escalate access inside a hacked company and then exfiltrate its data before encrypting files.

Leaked on an underground cybercrime forum named XSS earlier today, the files were shared by an individual who appears to have had an issue with the low amount of money the Conti gang was paying them to breach corporate networks.

Image: The Record
Image: The Record

In messages spammed across the forum, the individual shared screenshots of IP addresses where the Conti gang hosts Cobalt Strike command-and-control servers, which Conti affiliate members use to access hacked company networks.

In addition, the individual also published a RAR archive named “Мануали для работяг и софт.rar,” which roughly translates to “Manuals for hard workers and software.rar.”

This archive contains 37 text files with instructions on how to use various hacking tools and even legitimate software during a network intrusion.

For example, the leaked manuals contain guides on how to:

  • configure the Rclone software with a MEGA account for data exfiltration
  • configure the AnyDesk software as a persistence and remote access solution into a victim’s network [a known Conti tactic]
  • configure and use the Cobalt Strike agent
  • use the NetScan tool to scan internal networks
  • install the Metasploit pen-testing framework on a virtual private server (VPS)
  • connect to hacked networks via RDP using a Ngrok secure tunnel
  • elevate and gain admin rights inside a company’s hacked network
  • take over domain controllers
  • dump passwords from Active Directories (NTDS dumping)
  • perform SMB brute-force attacks
  • brute-force routers, NAS devices, and security cameras
  • use the ZeroLogon exploit
  • perform a Kerberoasting attack
  • disable Windows Defender protections
  • delete shadow volume copies
  • how affiliates can configure their own operating systems to use the Tor anonymity network, and more
Image: The Record

Leaks from Ransomware-as-a-Service (RaaS) operations are extremely rare; however, the data shared today isn’t anything that security researchers would describe as groundbreaking.

The leaked files contain guides for basic offensive tactics and techniques that the Conti and other ransomware gangs have used during previous intrusions for years.

However, the leak will help some security firms put together stronger defensive playbooks that they can recommend to their customers in order to improve their ability to detect Conti intrusions—now knowing exactly what operations Conti affiliates might execute.

Catalin Cimpanu

Catalin Cimpanu is a cybersecurity reporter for The Record. He previously worked at ZDNet and Bleeping Computer, where he became a well-known name in the industry for his constant scoops on new vulnerabilities, cyberattacks, and law enforcement actions against hackers.

Recent Posts

Group-IB helps Italian officials take down scammers selling COVID-19 docs via Telegram

Italian police announced that they had broken up a criminal gang selling hundreds of fake…

18 hours ago

US sanctions 28 quantum computing entities in China, Russia, Pakistan, Japan

The US Department of Commerce has sanctioned 28 organizations from China, Russia, Pakistan, Japan, and…

2 days ago

North Korean hackers posed as Samsung recruiters to target security researchers

North Korean state-sponsored hackers posed as Samsung recruiters and sent fake job offers to employees…

2 days ago

China’s top policymaking body charts plan for science and technology ‘self-sufficiency’

China's top leadership unveiled a plan for developing homegrown science and technology with an eye…

2 days ago

Israel restricts cyberweapons export list by two-thirds, from 102 to 37 countries

The Israeli government has restricted the list of countries to which local security firms are…

3 days ago

China agency tells Tencent their apps have to be approved before they go live or update

Chinese regulators have told video game giant Tencent that it will need to submit its…

3 days ago