Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Malware & Threats

Ukrainian Security Researcher Leaks Newer Conti Ransomware Source Code

A Ukrainian security researcher has leaked the source code of what appears to be a newer version of the Conti ransomware. This is part of a series of leaks prompted by the cybercrime group expressing support for Russia.

A Ukrainian security researcher has leaked the source code of what appears to be a newer version of the Conti ransomware. This is part of a series of leaks prompted by the cybercrime group expressing support for Russia.

Shortly after Russia launched its invasion of Ukraine, the notorious Conti ransomware group issued a statement warning that it was prepared to hit the critical infrastructure of Russia’s enemies in retaliation for potential attacks on Russia.

In response, an anonymous individual set up a Twitter account named “Conti Leaks” and started releasing files allegedly stolen from the cybercrime gang. The first round of leaks represented messages exchanged between members of the Conti organization in the past year. The second round included more chat logs, credentials, email addresses, C&C server details, as well as source code for the Conti ransomware and other malware.

After more than two weeks of inactivity, the Twitter account once again became active over the weekend and made available what appears to be the source code of a newer version of Conti.

Previously, some described the leaker as a security researcher from Ukraine while others suggested they were a rogue member of the Conti group. Leaked messages exchanged between the cybercrime group’s members showed that they too believed one of them could be behind the breach.

[ READ: U.S. Warns of Conti Ransomware Attacks as Gang Deals With Leak Fallout ]

However, the leaker claimed on the “Conti Leaks” Twitter account over the weekend that they are indeed a security researcher from Ukraine. “I’m not affiliate of Conti, I’m just boring security researcher,” they said.

The newly leaked source code has been uploaded by the researcher to Google’s VirusTotal malware analysis service as a password-protected archive file. However, the password for the archive was also shared on Twitter.

Advertisement. Scroll to continue reading.

Only paid account holders can download files from VirusTotal, but the Conti source code files were quickly made available by others on various websites from where they can be downloaded by anyone.

The previously leaked files were dated September 2020 and file names suggested the source code was for Conti version 2. The newly leaked files are dated January 2021 and file names indicate that the source code is for version 3 of the ransomware. Some researchers appear to have confirmed that the source code is genuine.

Conti source code leak

After the first Conti source code leak, many members of the cybersecurity community noted that while the code could be useful to them, it might be more useful to malicious actors, as it could make it easier for them to create their own ransomware.

When Russia launched its invasion of Ukraine, the Conti gang issued a threatening statement suggesting that they were backing the Russian government. They later clarified that they condemned the war and denied being the allies of any government.

However, an analysis of the leaked Conti files conducted by Wired showed that the group appears to sometimes operate in line with Russia’s interests and some evidence points to a possible connection to Russia’s FSB security agency.

Until recently, it was well known that Russian authorities would not target local cybercrime groups as long as they did not attack organizations or individuals within Russia. That appeared to change recently when Russia announced arresting members of high-profile gangs, in some cases at the request of the United States.

However, the support provided by the West to Ukraine in its war with Russia will likely mean that the recent diplomatic progress between Washington and Moscow on this subject will be rolled back. Moreover, the US has expressed concern that ransomware proceeds could be leveraged by Russia to evade economic sanctions.

Related: REvil Ransomware Operations Apparently Unaffected by Recent Arrests

Related: Dark Web Chatter: What Other Russian Hackers Are Saying About the REvil Arrests

Related: Financially Motivated Hackers Use Leaked Conti Ransomware Techniques in Attacks

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

Expert Insights

Related Content

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Ransomware

A SaaS ransomware attack against a company’s Sharepoint Online was done without using a compromised endpoint.

Cybercrime

Satellite TV giant Dish Network confirmed that a recent outage was the result of a cyberattack and admitted that data was stolen.

Malware & Threats

The NSA and FBI warn that a Chinese state-sponsored APT called BlackTech is hacking into network edge devices and using firmware implants to silently...

Data Breaches

Sony shares information on the impact of two recent unrelated hacker attacks carried out by known ransomware groups. 

Ransomware

Several major organizations are confirming impact from the latest zero-day exploits hitting Fortra's GoAnywhere software.

Data Breaches

KFC and Taco Bell parent company Yum Brands says personal information was compromised in a January 2023 ransomware attack.