{"id":7265,"date":"2022-04-11T18:01:26","date_gmt":"2022-04-11T18:01:26","guid":{"rendered":"https:\/\/gridinsoft.com\/blogs\/?p=7265"},"modified":"2022-04-16T23:14:49","modified_gmt":"2022-04-16T23:14:49","slug":"conti-source-codes","status":"publish","type":"post","link":"https:\/\/gridinsoft.com\/blogs\/conti-source-codes\/","title":{"rendered":"Leaked Conti ransomware source codes were used to attack Russian authorities"},"content":{"rendered":"<h4>In March 2022, the source codes of the Conti malware were made public, and now, apparently, other hackers are starting to use them, turning the ransomware against Russian authorities and companies.<\/h4>\n<p>Let me remind you that this story began back in February 2022, when an anonymous information security researcher who had access to the infrastructure of hackers (according to other sources, this was a Ukrainian member of the hack group itself) decided to take revenge on <b>Conti<\/b>. The fact is that the group <a href=\"\/blogs\/hacker-groups-split-up-some-of-them-support-russia-others-ukraine\/\">announced<\/a> that, in the light of the \u201cspecial military operation\u201d in Ukraine, it fully supports the actions of the Russian government.<\/p>\n<p>As a result, all <a target=\"_blank\" href=\"https:\/\/therecord.media\/conti-ransomware-gang-chats-leaked-by-pro-ukraine-member\/\" rel=\"noopener nofollow\">internal hacker chats<\/a> over the past year were first released to the public (339 JSON files, each of which is a log for a single day), and then another portion of the logs was published (another 148 JSON files containing 107,000 internal grouping messages) and <a target=\"_blank\" href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/conti-ransomware-source-code-leaked-by-ukrainian-researcher\/\" rel=\"noopener nofollow\">other data<\/a> related to Conti, including control panel source code, <b>BazarBackdoor<\/b> API, old ransomware source code, server screenshots, and more. These leaks were followed by another, with <a target=\"_blank\" href=\"https:\/\/howtofix.guide\/conti-source-codes\/\" rel=\"noopener nofollow\">more recent sources<\/a> of the Conti malware.<\/p>\n<p>According to <b><a target=\"_blank\" href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/hackers-use-contis-leaked-ransomware-to-attack-russian-companies\/\" rel=\"noopener nofollow\">Bleeping Computer<\/a><\/b>, a hack group <b>NB65<\/b> has already adapted the Conti sources and is attacking Russian organizations. According to the publication, NB65 has been hacking into Russian organizations for the past month, stealing data and leaking it to the network. At the same time, the hackers claimed that the attacks were connected with a \u201cspecial operation\u201d in Ukraine.<\/p>\n<p>For example, in March, a hack group claimed that it had already compromised the <b><a target=\"_blank\" href=\"https:\/\/twitter.com\/xxNB65\/status\/1504253942410223622\" rel=\"noopener nofollow\">Tenzor<\/a><\/b> IT company, <b><a target=\"_blank\" href=\"https:\/\/twitter.com\/xxNB65\/status\/1504933046734233600\" rel=\"noopener nofollow\">Roscosmos<\/a><\/b>, and <b><a target=\"_blank\" href=\"https:\/\/twitter.com\/xxNB65\/status\/1507579487608844289\" rel=\"noopener nofollow\">VGTRK<\/a><\/b>. For example, hackers wrote that they had stolen 786.2 GB of data from VGTRK, including 900,000 emails and 4,000 other files, which were eventually published on the DDoS Secrets website.<\/p>\n<p>Now, NB65 has switched to using ransomware, creating its own malware based on the Conti source codes, a sample of which was found on <b><a target=\"_blank\" href=\"https:\/\/www.virustotal.com\/gui\/file\/7f6dbd9fa0cb7ba2487464c824b6d7e16ace9d4cd15e4452df4c9a9fd6bd1907\" rel=\"noopener nofollow\">VirusTotal<\/a><\/b>. It turned out that almost all security solutions identify this threat as Conti, but <b>Intezer Analyze<\/b> <a target=\"_blank\" href=\"https:\/\/analyze.intezer.com\/analyses\/0fea9380-e256-4be1-a7f8-e0589e315d80\/sub\/b44999fc-035c-486b-9625-a9cdf4473ec2\/genetic-summary\" rel=\"noopener nofollow\">calculated<\/a> that the malware uses only 66% of the same code.<\/p>\n<p>Journalists who have been able to talk to the hackers, report that they created malware based on the first Conti source leak, but modify the malware for each victim so that existing decryptors do not work. Also, representatives of NB65 assured the publication that they support Ukraine and will attack Russian companies, including those owned by private individuals, up to the cessation of all military actions.<\/p>\n<div class=\"su-quote su-quote-style-default su-quote-has-cite\"><div class=\"su-quote-inner su-u-clearfix su-u-trim\">We will not attack targets outside of Russia. Groups like Conti and <b>Sandworm<\/b>, along with other Russian APTs, have been attacking the West for years with ransomware and conducting supply chain attacks (<b>SolarWinds<\/b>, defense contractors). We decided it was time for them to experience it for themselves.<span class=\"su-quote-cite\">says NB65.<\/span><\/div><\/div>\n<p>Let me remind you that we also wrote that the <a href=\"\/blogs\/russian-aviation-switched-to-paper-documents\/\">Russian Aviation agency switched to paper documents due to a hacker attack<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In March 2022, the source codes of the Conti malware were made public, and now, apparently, other hackers are starting to use them, turning the ransomware against Russian authorities and companies. Let me remind you that this story began back in February 2022, when an anonymous information security researcher who had access to the infrastructure [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":7269,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","_sitemap_exclude":false,"_sitemap_priority":"","_sitemap_frequency":"","footnotes":""},"categories":[15],"tags":[163,566,55,320],"class_list":{"0":"post-7265","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security-news","8":"tag-bleeping-computer","9":"tag-conti","10":"tag-ransomware","11":"tag-solarwinds"},"featured_image_src":"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2022\/04\/Conti-source-codes.jpg","author_info":{"display_name":"Vladimir Krasnogolovy","author_link":"https:\/\/gridinsoft.com\/blogs\/author\/krasnogolovy\/"},"_links":{"self":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/7265","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/comments?post=7265"}],"version-history":[{"count":3,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/7265\/revisions"}],"predecessor-version":[{"id":7268,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/7265\/revisions\/7268"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/media\/7269"}],"wp:attachment":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/media?parent=7265"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/categories?post=7265"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/tags?post=7265"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}