• Revenge hackers leak more Conti ransomware source code

    From TechnologyDaily@1337:1/100 to All on Mon Mar 21 16:30:04 2022
    Revenge hackers leak more Conti ransomware source code

    Date:
    Mon, 21 Mar 2022 16:09:43 +0000

    Description:
    A Ukrainian cybersecurity researcher has been leaking Conti's dirty laundry for the past three weeks

    FULL STORY ======================================================================

    A newer version of the source code for the Conti ransomware has been leaked online, reportedly by the same person whos been tearing the group apart for the past three weeks.

    The incident is the latest in a series of leaks from a Ukrainian
    cybersecurity researcher who is running a personal vendetta of sorts against Conti, ever since the latter declared it would side with Russia, as it
    invades its western neighbor.

    That being said, the source code for Conti version 3 was uploaded to VirusTotal, and linked on Twitter. The archive is protected with a password, but the password was posted in one of the replies to the Twitter thread. TechRadar needs you!

    We're looking at how our readers use VPNs with different devices so we can improve our content and offer better advice. This survey shouldn't take more than 60 seconds of your time, and entrants from the UK and US will have the chance to enter a draw for a 100 Amazon gift card (or equivalent in USD). Thank you for taking part.

    Click here to start the survey in a new window << Conti's chat logs leaked

    This is not the first time the researcher publishes Contis source code
    online, but unlike the previous leak, which was for a much older version of the ransomware, this one is dated January 25, 2021, making it at least a year younger than the earlier leak.

    BleepingComputer notes the source code leak is a Visual Studio solution that anyone can use to compile the ransomware locker and decryptor, and that it works just fine. The publication managed to compile it with no issues.

    While this doesnt mean whoever gets infected can use the source code to
    obtain a master key, it does mean that Conti copycats might start popping up, and that could hurt the groups operations.

    Before leaking the source code, the researcher also leaked tens of thousands of private chat messages, some of which might even lead to arrests. Initial investigations suggest the chat logs disclose details such as previously unreported victims, private data leak URLs, bitcoin addresses, and
    discussions about their operations. Read more

    Conti ransomware group has internal chats leaked after siding with Russia


    Conti ransomware source code leaked by Ukrainian researcher


    TrickBot malware has been taken over by this notorious criminal gang

    Conti is an active ransomware group, which only recently hit American
    cookware distributor Meyer, stealing sensitive employee information.

    The group seems to have taken Meyer employees full names, physical addresses, birthdates, gender and ethnicity information, Social Security numbers, health insurance information and data on employee medical conditions, random drug screening results, Covid vaccination cards, drivers licenses, passport data, government ID numbers, permanent resident cards, immigration status information, and information on dependents.

    It was also reported that some of the top members of the notorious TrickBot malware family have also recently joined Contis ranks. Check out the best endpoint protection software right now

    Via: BleepingComputer



    ======================================================================
    Link to news story: https://www.techradar.com/news/revenge-hackers-leak-more-conti-ransomware-sour ce-code/


    --- Mystic BBS v1.12 A47 (Linux/64)
    * Origin: tqwNet Technology News (1337:1/100)