{"id":42256,"date":"2021-08-30T10:35:29","date_gmt":"2021-08-30T08:35:29","guid":{"rendered":"https:\/\/eiposgrados.com\/?p=42256"},"modified":"2021-10-29T16:32:24","modified_gmt":"2021-10-29T14:32:24","slug":"ransomware-technical-manuals-leaked","status":"publish","type":"post","link":"https:\/\/eiposgrados.com\/eng\/cybersecurity-blog\/ransomware-technical-manuals-leaked\/","title":{"rendered":"Ransomware technical manuals leaked"},"content":{"rendered":"<p>A news of <strong>ransom<\/strong>ware out of the ordinary: <strong>\u201cConti Ransomware technical manuals have been leaked\u201d<\/strong>.<\/p>\n\n\n\n<p>Cybersecurity was born as a tool to safeguard information and plays a very important role with digital transformation. He <a href=\"https:\/\/eiposgrados.com\/eng\/master-in-cybersecurity\/\" data-type=\"URL\" data-id=\"https:\/\/eiposgrados.com\/master-en-ciberseguridad\/\">Master in Cybersecurity Management, Ethical Hacking and Offensive Security<\/a>, focused on employability, will train you in this area. <\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Leakage by a cybercriminal<\/h2>\n\n\n\n<p>It appears that the leak has been<strong> carried out by a member of the cybercriminal gang itself <\/strong>as possible in some hacking forums. Here you can speculate about the reasons that led him to do it, altruism, discontent or anger towards the band itself, etc. But the fact is that the insider was on the evil side in this case.<\/p>\n\n\n\n<p><strong>Conti Ransomware<\/strong>, was first detected in 2020 affecting all versions of Windows. It is not an automatic Ransomware, but it requires cybercriminals to direct it towards their victims in North America and Europe. Managed by the Wizard Spiders group, it is offered as Ransomware-as-a-Service (RaaS). It differs from the vast majority of Ransomware by using a completely customized encryption implementation.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Consequences of the leak<\/h2>\n\n\n\n<p>The leak of the manuals has meant for the gang of cybercriminals a <strong>decrease in your income <\/strong>since it charged its clients for the RaaS service. <\/p>\n\n\n\n<p><strong>The \u201cjilted hacker\u201d <\/strong>leaked on the XSS forum screenshots of the IP addresses where cybercriminals <strong>they hosted the servers<\/strong> Cobalt Strike command and control system that Conti affiliates use to access the networks of hacked companies, according to The Record Media. He also published a 113 MB file containing several<strong> tools, manuals in Russian, training materials and help documents <\/strong>which are supposedly provided to affiliates when they carry out Conti Ransomware attacks.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large is-resized\"><img fetchpriority=\"high\" decoding=\"async\" src=\"https:\/\/eiposgrados.com\/wp-content\/uploads\/2021\/08\/ciberseguridad-filtrados-los-manuales-tecnicos-de-ransomware-1024x683.jpg\" alt=\"Ransomware technical manuals leaked\" class=\"wp-image-42264\" width=\"519\" height=\"346\" title=\"\"><\/figure><\/div>\n\n\n\n<p>The manuals showed the \u201caffiliates\u201d how to develop step-by-step processes to access, move laterally and climb in the access of the <strong>hacked companies<\/strong> to leak the information before the files were encrypted.&nbsp;<\/p>\n\n\n\n<p><strong>Wizard Spide<\/strong>r is supposedly responsible for the attack on the SEPE. It is a Russian group that has earned four million euros in one year.&nbsp;<\/p>\n\n\n\n<p>The leak of these manuals is very useful for many cybersecurity companies and entities that fight against cybercrime, since they can study them and develop more effective plans to protect their computer systems and networks.<\/p>","protected":false},"excerpt":{"rendered":"<p>Ransomware technical manuals leaked, from the hand of one of the members of the cybercriminal gang. We tell you everything!<\/p>","protected":false},"author":1,"featured_media":51603,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[332],"tags":[],"class_list":["post-42256","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog-ciberseguridad"],"acf":[],"_links":{"self":[{"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/posts\/42256","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/comments?post=42256"}],"version-history":[{"count":0,"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/posts\/42256\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/media\/51603"}],"wp:attachment":[{"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/media?parent=42256"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/categories?post=42256"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/tags?post=42256"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}