Conti ransomware fell victim to a data leak

Even operators of the Conti ransomware fell victim to a data leak: the Swiss cybersecurity company Prodaft was able to determine the real IP address of one of the group’s servers and remained in the system for more than a month.

The affected server was the group’s payment portal (or so-calledrecovery server”) to which hackers invited their victims to negotiate a ransom. The server was hosted by the Ukrainian hotser ITL LLC and located at the IP address 217.12.204.135.

Our team discovered a vulnerability in the recovery servers that Conti uses and exploited the vulnerability to discover the real IP addresses of the hidden service where the site was hosted.says the Prodaft report.

The researchers kept access to the server for several weeks and monitored all network traffic and IP addresses. While some of the addresses belonged to the victims and their intermediaries, Prodaft also tracked SSH connections that most likely belonged to the hackers themselves. Alas, all SSH IP addresses were associated with the Tor exit nodes, that is, it was not possible to use them to identify members of the hack group.

Conti Server

The researchersreport also provided other valuable information, including information about the OS of the Conti server and the htpasswd file, which contained a hashed version of the server password. Prodaft emphasizes that it has shared all of its findings with law enforcement, and some details are kept secret to give law enforcement time to take action.

The publication of the report did not went unnoticed not only among information security experts, but also among the hackers themselves. The point is, leaking the server’s IP address and hashed password would potentially open the server up to competing hack groups. As a result, within a few hours after the publication of the report, MalwareHunterTeam researchers noticed that Conti had shut down its payment portal. The sudden server downtime made it impossible for Conti’s recent victims to contact the hackers and pay the ever-increasing ransom.

As a result, Conti payment portal returned online more than 24 hours after the shutdown, and an angry message appeared on the blog of the hack group, which says thatEuropeans seem to have decided to forget about their manners and behaved like bullies trying to hack our systems.

The hackers also denied Prodaft’s assertion made last week: researchers wrote that since July 2021, the ransomwareearnedabout $ 25.5 million. Conti’s operators said they actually made more than $ 300,000,000 in profits. Tuy nhiên, this is most likely just bragging, which attackers use to promote themselves and increase the profitability of their attacks.

Interestingly, some experts have already criticized Prodaft for publicly disclosing information, which only led to Conti tightening the security of its servers.

Hãy để tôi nhắc bạn rằng chúng tôi cũng đã viết rằng Hive ransomware infected MediaMarkt and its operators demand $ 240 million.

Helga Smith

Tôi luôn quan tâm đến khoa học máy tính, đặc biệt là bảo mật dữ liệu và chủ đề, được gọi là ngày nay "khoa học dữ liệu", kể từ khi tôi còn ở tuổi thiếu niên. Trước khi vào nhóm Diệt Virus với vai trò Tổng biên tập, Tôi đã làm việc với tư cách là chuyên gia an ninh mạng tại một số công ty, bao gồm một trong những nhà thầu của Amazon. Một trải nghiệm khác: Tôi đã nhận được đang giảng dạy tại các trường đại học Arden và Reading.

Gửi phản hồi

Website này sử dụng Akismet để hạn chế spam. Tìm hiểu bình luận của bạn được duyệt như thế nào.

Nút quay lại đầu trang