Conti ransomware was discovered in December 2019 and is delivered via TrickBot. It’s been utilized against large companies and government institutions across the world, especially in North America. Conti steals important files and information from targeted networks and threatens to disseminate it unless the ransom is paid. Conti ransomware enhances performance by utilizing “up to 32 simultaneous encryption operations,” and is very likely directly controlled by its controllers. This ransomware can target network-based resources while ignoring local files. This feature has the noticeable impact of being able to create targeted harm in an environment in a way that might hinder incident response actions.
In support of Ukraine against Russia, a security researcher released 13 months of sensitive data against the Russian nation-state actor, Conti. The data includes chat logs between the members of Conti and their victims with bitcoin address, and it also contains manuals on deployment of the Cobalt Strike.
The Conti data is “a must-read for any security professional because it gives you an insight of how ransomware really works,” Holden says.
There are around 150 bitcoin addresses, chat handles, IP addresses, control panels and other infrastructure data that will be immensely useful for tracking the gang as well as the affiliates who use its malware, Liska says.
Please note that while the IOCs may not be malicious, they were extracted directly from the Conti data leak and hence have been used by the group members for internal communication and attacks.