Share on social networks!

Ransomware technical manuals leaked

A news of ransomware out of the ordinary: “Conti Ransomware technical manuals have been leaked”.

Cybersecurity was born as a tool to safeguard information and plays a very important role with digital transformation. He Master in Cybersecurity Management, Ethical Hacking and Offensive Security, focused on employability, will train you in this area.

Leakage by a cybercriminal

It appears that the leak has been carried out by a member of the cybercriminal gang itself as possible in some hacking forums. Here you can speculate about the reasons that led him to do it, altruism, discontent or anger towards the band itself, etc. But the fact is that the insider was on the evil side in this case.

Conti Ransomware, was first detected in 2020 affecting all versions of Windows. It is not an automatic Ransomware, but it requires cybercriminals to direct it towards their victims in North America and Europe. Managed by the Wizard Spiders group, it is offered as Ransomware-as-a-Service (RaaS). It differs from the vast majority of Ransomware by using a completely customized encryption implementation.

Consequences of the leak

The leak of the manuals has meant for the gang of cybercriminals a decrease in your income since it charged its clients for the RaaS service.

The “jilted hacker” leaked on the XSS forum screenshots of the IP addresses where cybercriminals they hosted the servers Cobalt Strike command and control system that Conti affiliates use to access the networks of hacked companies, according to The Record Media. He also published a 113 MB file containing several tools, manuals in Russian, training materials and help documents which are supposedly provided to affiliates when they carry out Conti Ransomware attacks.

Ransomware technical manuals leaked

The manuals showed the “affiliates” how to develop step-by-step processes to access, move laterally and climb in the access of the hacked companies to leak the information before the files were encrypted. 

Wizard Spider is supposedly responsible for the attack on the SEPE. It is a Russian group that has earned four million euros in one year. 

The leak of these manuals is very useful for many cybersecurity companies and entities that fight against cybercrime, since they can study them and develop more effective plans to protect their computer systems and networks.

Subscribe to our newsletter to stay up to date with all the news

EIP International Business School informs you that the data in this form will be processed by Mainjobs Internacional Educativa y Tecnológica, SA as the person responsible for this website. The purpose of collecting and processing personal data is to respond to the query made as well as to send information about the services of the data controller. Legitimation is the consent of the interested party.
You can exercise your rights of access, rectification, limitation and deletion of data in compliance@grupomainjobs.com as well as the right to file a claim with the supervisory authority. You can consult additional and detailed information on Data Protection in the Privacy Policy that you will find in our Web page
Master Cybersecurity Professional Master

Leave a comment