{"id":46529,"date":"2022-03-10T03:40:00","date_gmt":"2022-03-10T08:40:00","guid":{"rendered":"http:\/\/blog.cybercon1.com\/?p=46529"},"modified":"2022-03-10T03:40:00","modified_gmt":"2022-03-10T08:40:00","slug":"conti-ransomware-gangs-internal-chats-leaked","status":"publish","type":"post","link":"https:\/\/blog.cyberconservices.com\/index.php\/2022\/03\/10\/conti-ransomware-gangs-internal-chats-leaked\/","title":{"rendered":"Conti ransomware gang&#8217;s internal chats leaked"},"content":{"rendered":"\n<p>Seriously?  Not affiliated with any government, but will use our resources in order to strike back due to American cyber aggression.  Sorry comrade, not sorry.<\/p>\n\n\n\n<p>By <a href=\"https:\/\/techcrunch.com\/author\/zack-whittaker\/\">Zack Whittaker<\/a> &#8211; A cache of chat logs belonging to the Conti <strong>ransomware<\/strong> group have leaked online thanks to an apparent insider, who claimed to have objected to the group\u2019s support for the Russian invasion of Ukraine.<\/p>\n\n\n\n<p>The leak was&nbsp;<a href=\"https:\/\/twitter.com\/vxunderground\/status\/1498060366445613056\" target=\"_blank\" rel=\"noreferrer noopener\">shared with VX-Underground<\/a>, a malware research group that collects malware samples and data. The leaked data set has about 400 files containing tens of thousands of internal chat logs of the Conti group in their native Russian. The files hold about a year\u2019s worth of messages dating back to January 2021, some six months after the group first formed in mid-2020.<\/p>\n\n\n\n<p><strong>Ransomware<\/strong> experts are already poring over the files to learn more about the internal operations of the group. Security researcher Bill Demirkapi\u00a0<a rel=\"noreferrer noopener\" href=\"https:\/\/twitter.com\/BillDemirkapi\/status\/1498084129874882561\" target=\"_blank\">translated the files<\/a>\u00a0into English.<\/p>\n\n\n\n<p>Conti is a <strong>ransomware<\/strong>-as-a-service (RaaS) group, which allows affiliates to\u00a0<a rel=\"noreferrer noopener\" href=\"https:\/\/www.cisa.gov\/uscert\/ncas\/alerts\/aa21-265a\" target=\"_blank\">rent access<\/a>\u00a0to its infrastructure to launch attacks. Experts say Conti is based in Russia and may have ties to Russian intelligence.<\/p>\n\n\n\n<p>Earlier this week, Conti said in a blog post \u2014 first\u00a0<a rel=\"noreferrer noopener\" href=\"https:\/\/www.reuters.com\/technology\/russia-based-ransomware-group-conti-issues-warning-kremlin-foes-2022-02-25\/\" target=\"_blank\">reported by Reuters<\/a>\u00a0and also seen by TechCrunch \u2014 that it had \u201cfull support\u201d for the Russian invasion of neighboring Ukraine, and vowed to retaliate against critical infrastructure if Russia is hit with cyber or military attacks. In an updated post, the group claimed it is not allied with any government, but reiterated: \u201cWe will use our resources in order to strike back if the well being and safety of peaceful citizens will be at stake due to American cyber aggression.\u201d  <a rel=\"noreferrer noopener\" href=\"https:\/\/www.google.com\/url?rct=j&amp;sa=t&amp;url=https:\/\/techcrunch.com\/2022\/02\/28\/conti-ransomware-chats-leaked\/&amp;ct=ga&amp;cd=CAEYAioTODQ0MTMwMzM1OTkyMDM4MDI2MTIaZjk1ZDdkNTc3NTkyZGUyMTpjb206ZW46VVM&amp;usg=AFQjCNH_Llyt-A1ntHnaPD-e_DuBq2z00w\" target=\"_blank\">Read On:<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Seriously? Not affiliated with any government, but will use our resources in order to strike back due to American cyber aggression. Sorry comrade, not sorry. By Zack Whittaker &#8211; A cache of chat logs belonging to the Conti ransomware group <span class=\"excerpt-dots\">&hellip;<\/span> <a class=\"more-link\" href=\"https:\/\/blog.cyberconservices.com\/index.php\/2022\/03\/10\/conti-ransomware-gangs-internal-chats-leaked\/\"><span class=\"more-msg\">Continue reading &rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":46530,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"advanced_seo_description":"","jetpack_seo_html_title":"","jetpack_seo_noindex":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[636],"tags":[637],"class_list":["post-46529","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ransomware","tag-ransomware"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack-related-posts":[],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts\/46529","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/comments?post=46529"}],"version-history":[{"count":0,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts\/46529\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/"}],"wp:attachment":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/media?parent=46529"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/categories?post=46529"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/tags?post=46529"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}