![]() Conti launched their operation in July 2020, so while it contains a big chunk of their internal conversations, it is not all of them.”Īs to the content of the messages, they cover a wide array of topics discussed by gang members but have been seen to include previously unreported victims, private data leak URLs, bitcoin addresses, and discussions about their operations.įurther, Bleeping Computer discovered conversations about how the publication had discovered their December attack on Shutterfly. “In total, there are 393 leaked JSON files containing a total of 60,694 messages since January 21, 2021, through today. Regarding more detailed figures Bleeping Computer, who also verified the leak, notes, ![]() On February 25, security firm Hold Security confirmed that a Ukrainian security researcher has leaked over 60,000 internal messages belonging to the Conti ransomware operation. The first retaliation came in the form of a data leak. This of course was not accepted with open arms by many in the InfoSec community. Going back to the end of February, the Conti gang announced their unwavering support for Russia and the country’s military invasion of Ukraine. The recent upheaval Europe seems to have placed a dedicated number of security researchers against the ransomware gang. At the time it was speculated this would propel Conti into the ransomware hall of fame. ![]() When this publication last covered Conti, the ransomware used by a highly skilled gang infamous for targeting large corporations, it covered how the gang had brought some of TrickBot’s experienced malware developers into the fold to work on making BazarBackdoor more efficient at distributing the ransomware. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |