{"id":18519,"date":"2022-03-16T10:45:05","date_gmt":"2022-03-16T18:45:05","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2022\/03\/16\/news-12252\/"},"modified":"2022-03-16T10:45:05","modified_gmt":"2022-03-16T18:45:05","slug":"news-12252","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2022\/03\/16\/news-12252\/","title":{"rendered":"The Workaday Life of the World\u2019s Most Dangerous Ransomware Gang"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/62312ee47a22075957fa019c\/master\/pass\/security-randsomewhere.jpg\"\/><\/p>\n<p><strong>Credit to Author: Matt Burgess| Date: Wed, 16 Mar 2022 11:00:00 +0000<\/strong><\/p>\n<p class=\"BylineWrapper-iiTsTb hAGfXd byline bylines__byline\" data-testid=\"BylineWrapper\" itemprop=\"author\" itemtype=\"http:\/\/schema.org\/Person\"><span itemprop=\"name\" class=\"BylineNamesWrapper-dbkCxf erRIa-D\"><span data-testid=\"BylineName\" class=\"BylineName-cKXFOb UCAzg byline__name\"><a class=\"BaseWrap-sc-TURhJ BaseText-fFzBQt BaseLink-gZQqBA BylineLink-eZnyPI eTiIvU mEZDb fNdcwQ bKZMMS byline__name-link button\" href=\"\/author\/matt-burgess\">Matt Burgess<\/a><\/span><\/span><\/p>\n<p>To revist this article, visit My Profile, then <a href=\"\/account\/saved\">View saved stories<\/a>.<\/p>\n<p>To revist this article, visit My Profile, then <a href=\"\/account\/saved\">View saved stories<\/a>.<\/p>\n<p><span class=\"lead-in-text-callout\">The Conti ransomware<\/span> gang was on top of the world. The sprawling network of cybercriminals extorted <a data-offer-url=\"https:\/\/blog.chainalysis.com\/reports\/2022-crypto-crime-report-preview-ransomware\/\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/blog.chainalysis.com\/reports\/2022-crypto-crime-report-preview-ransomware\/&quot;}\" href=\"https:\/\/blog.chainalysis.com\/reports\/2022-crypto-crime-report-preview-ransomware\/\" rel=\"nofollow noopener\" target=\"_blank\">$180 million from its victims last year<\/a>, eclipsing the earnings of all other <a href=\"https:\/\/www.wired.com\/tag\/ransomware\">ransomware<\/a> gangs. Then it backed <a href=\"https:\/\/www.wired.com\/story\/ukraine-it-army-russia-war-cyberattacks-ddos\/\">Vladimir Putin\u2019s invasion of Ukraine<\/a>. And it all started falling apart.<\/p>\n<p class=\"paywall\">Conti\u2019s implosion started with a single post on the group\u2019s website, usually reserved for posting the names of its victims. Hours after <a href=\"https:\/\/www.wired.com\/story\/ukraine-russia-war-tiktok\/\">Russian troops crossed Ukrainian borders<\/a> on February 24, Conti <a data-offer-url=\"https:\/\/twitter.com\/BrettCallow\/status\/1497249143663652865\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/twitter.com\/BrettCallow\/status\/1497249143663652865&quot;}\" href=\"https:\/\/twitter.com\/BrettCallow\/status\/1497249143663652865\" rel=\"nofollow noopener\" target=\"_blank\">offered<\/a> its \u201cfull support\u201d to the Russian government and threatened to hack critical infrastructure belonging to anyone who dared to <a href=\"https:\/\/www.wired.com\/story\/hacktivists-pandemonium-russia-war-ukraine\/\">launch cyberattacks against Russia<\/a>.<\/p>\n<p class=\"paywall\">But while many Conti members <a href=\"https:\/\/www.wired.com\/story\/cl0p-ransomware-russia-putin-biden\/\">live in Russia<\/a>, its scope is international. The war has divided the group; privately, some had railed <a data-offer-url=\"https:\/\/twitter.com\/HoldSecurity\/status\/1499186845699170305\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/twitter.com\/HoldSecurity\/status\/1499186845699170305&quot;}\" href=\"https:\/\/twitter.com\/HoldSecurity\/status\/1499186845699170305\" rel=\"nofollow noopener\" target=\"_blank\">against Putin\u2019s invasion<\/a>. And while Conti\u2019s ringleaders scrambled to retract their statement, it was too late. The damage had been done. Especially because the dozens of people with access to Conti\u2019s files and internal chat systems included a Ukrainian cybersecurity researcher who had infiltrated the group. They proceeded to rip Conti wide open.<\/p>\n<p class=\"paywall\">On February 28, a newly created Twitter account called @ContiLeaks released more than <a data-offer-url=\"https:\/\/intelx.io\/?did=c1a56526-a254-4536-952f-cd9926f587c3\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/intelx.io\/?did=c1a56526-a254-4536-952f-cd9926f587c3&quot;}\" href=\"https:\/\/intelx.io\/?did=c1a56526-a254-4536-952f-cd9926f587c3\" rel=\"nofollow noopener\" target=\"_blank\">60,000 chat messages<\/a> sent among members of the gang, its source code, and scores of internal Conti documents. The scope and scale of the leak is unprecedented; never before have the daily inner workings of a ransomware group been laid so bare. \u201cGlory to Ukraine,\u201d @ContiLeaks tweeted.<\/p>\n<p class=\"paywall\">The leaked messages, reviewed in depth by WIRED, provide an unrivaled view into Conti\u2019s operations and expose the ruthless nature of one of the world\u2019s most successful <a href=\"https:\/\/www.wired.com\/tag\/ransomware\/\">ransomware gangs<\/a>. Among their revelations are the group\u2019s sophisticated businesslike hierarchy, its members\u2019 personalities, how it dodges law enforcement, and details of its ransomware negotiations.<\/p>\n<p class=\"paywall\">\u201cWe see the gang progressing. We see the gang living. We see the gang committing crimes and changing over the course of several years,\u201d says Alex Holden, whose company <a data-offer-url=\"https:\/\/twitter.com\/HoldSecurity\/status\/1498079060660006916\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/twitter.com\/HoldSecurity\/status\/1498079060660006916&quot;}\" href=\"https:\/\/twitter.com\/HoldSecurity\/status\/1498079060660006916\" rel=\"nofollow noopener\" target=\"_blank\">Hold Security<\/a> has tracked Conti members for most of the last decade. Holden, who was born in Ukraine but lives in America, says he knows the cybersecurity researcher who leaked the documents but says they are staying anonymous for safety reasons.<\/p>\n<p class=\"paywall\">The Conti ransomware gang runs like any number of businesses around the world. It has multiple departments, from HR and administrators to coders and researchers. It has policies on how its hackers should process their code, and shares best practices to keep the group\u2019s members hidden from law enforcement.<\/p>\n<p class=\"paywall\">At the top of the business is Stern, who also goes by Demon and acts as the CEO\u2014Conti members call Stern the \u201cbig boss.\u201d All Conti members have pseudonymous usernames, which can change. Stern regularly chases people on their work and wants to account for their time. &quot;Hello, how are you doing, write the results, successes or failures,\u201d Stern wrote in one message sent to more than 50 Conti members in March 2021.<\/p>\n<p class=\"paywall\">The Conti chat logs span two years, from the start of 2020 until February 27, 2022\u2014the day before the messages leaked. In February <a href=\"https:\/\/www.wired.com\/story\/trickbot-malware-group-internal-messages\/\">WIRED reported on a small number of the messages<\/a>, after they were provided by another source. The conversations are fragmented\u2014think of taking your WhatsApp or Signal messages out of context\u2014and were released in their original Russian form. WIRED reviewed a machine-translated version of the messages.<\/p>\n<p class=\"paywall\">Some of the most revealing discussions take place between Stern and Mango, who acts as a general manager within Conti. Mango frequently launches into long monologues in private chats to Stern, either bemoaning team members or providing Stern with updates on the group\u2019s projects. \u201cThey seem to be responsible for procuring different tools for different departments and making sure that the employees are being paid,\u201d says Kimberly Goody, director of cybercrime analysis at security firm Mandiant.<\/p>\n<p class=\"paywall\">The main Conti team consisted of 62 people, Mango told Stern in the middle of 2021. The exact number of Conti members fluctuates over time\u2014at some points reaching around 100\u2014as people join and leave the group. In one instance Stern says they are thinking of recruiting 100 more participants. \u201cThe group is so big that there are still middle managers,\u201d group member Revers tells Meatball in June 2021.<\/p>\n<p class=\"paywall\">Potential workers are funneled into Conti\u2019s recruitment system from hacker forums and also legitimate job websites across the web. There\u2019s even something of an onboarding process: When one new member joins the group they\u2019re introduced to their team leader who will dish out their tasks. \u201cI will hold a planning meeting in the evening and appoint you to the team,\u201d Revers says in another message.<\/p>\n<p class=\"paywall\">\u201cWhat could be striking at first glance is the size, structure, and hierarchy of the organization,\u201d says Soufiane Tahiri, a security researcher who has been <a data-offer-url=\"https:\/\/twitter.com\/S0ufi4n3\/status\/1499299607523831810\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/twitter.com\/S0ufi4n3\/status\/1499299607523831810&quot;}\" href=\"https:\/\/twitter.com\/S0ufi4n3\/status\/1499299607523831810\" rel=\"nofollow noopener\" target=\"_blank\">reviewing the documents<\/a>. \u201cThey operate pretty much like a software development company, and contrary to popular belief it seems that many coders have salaries and do not take part in the paid ransom.\u201d<\/p>\n<p class=\"paywall\">Rank-and-file programmers are paid around $1,500 to $2,000 per month for their work, but those negotiating ransom payments can take a cut of the profits. The group even claimed to have <a data-offer-url=\"https:\/\/twitter.com\/HoldSecurity\/status\/1498364291468169219\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/twitter.com\/HoldSecurity\/status\/1498364291468169219&quot;}\" href=\"https:\/\/twitter.com\/HoldSecurity\/status\/1498364291468169219\" rel=\"nofollow noopener\" target=\"_blank\">an unnamed journalist on its payroll<\/a> in April 2021, who would get a 5 percent cut by helping put pressure on victims to pay up. \u201cWe have salaries on the 1st and 15th, usually 2 times a month,\u201d Mango tells one member of the group. Sometimes Conti members ask for extra money due to family problems\u2014one claims they need more because their mother suffered from a heart attack\u2014or because they\u2019re cash-strapped.<\/p>\n<p class=\"paywall\">Money is a frequent subject of discussion within Conti\u2014both a personal and group level. They debate the ransoms, often into millions of dollars, that they plan to charge businesses for providing them with decryption keys for their files. They discuss budgets available for buying equipment and the expenses of running physical offices and servers. \u201cThey also share a Google doc spreadsheet that contains a list of expenses,\u201d Goody says of one instance.<\/p>\n<p class=\"paywall\">But some Conti members display the bombast of <a data-offer-url=\"https:\/\/www.businessinsider.com\/millionaire-russian-hackers-evil-corp-car-pictures-video-2019-12?r=US&amp;IR=T#alongside-the-news-of-the-indictments-the-nca-released-a-variety-of-images-and-video-depicting-the-lavish-lifestyles-of-yakubets-and-his-cohorts-1\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.businessinsider.com\/millionaire-russian-hackers-evil-corp-car-pictures-video-2019-12?r=US&amp;IR=T#alongside-the-news-of-the-indictments-the-nca-released-a-variety-of-images-and-video-depicting-the-lavish-lifestyles-of-yakubets-and-his-cohorts-1&quot;}\" href=\"https:\/\/www.businessinsider.com\/millionaire-russian-hackers-evil-corp-car-pictures-video-2019-12?r=US&amp;IR=T#alongside-the-news-of-the-indictments-the-nca-released-a-variety-of-images-and-video-depicting-the-lavish-lifestyles-of-yakubets-and-his-cohorts-1\" rel=\"nofollow noopener\" target=\"_blank\">cybercriminals caught driving luxury cars and storing piles of cash<\/a>. Bio brags they have \u201c80k\u201d in their bank account and that they\u2019ve \u201cearned more this month with you than in 10 years.\u201d They quickly backtrack, saying they probably exaggerated. On another occasion Skippy says they purchased a 27-inch iMac with their earnings\u2014\u201cwanted all my life.\u201d<\/p>\n<p class=\"paywall\">Skippy was also excited about taking a holiday from work. In November 2021 they said they planned to fly abroad in the new year but were warned by Mango they could be arrested. \u201cIt&#x27;s up to you, of course, but I wouldn&#x27;t fly abroad,\u201d Mango said. Skippy replied asking if they are meant to \u201csit in Russia\u201d for the rest of their life. Mango advised making sure their phone is \u201cclean\u201d and not taking their laptop. On other occasions, gang members ask their superiors if the holiday they requested has been approved and if they can finish early.<\/p>\n<p class=\"paywall\">\u201cWe found through our logs that they have the full plethora of manuals of how they should maintain team spirit,\u201d says Vitali Kremez, the CEO of security company AdvIntel. Kremez\u2019s research is <a data-offer-url=\"https:\/\/twitter.com\/VK_Intel\/status\/1498761290709409792\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/twitter.com\/VK_Intel\/status\/1498761290709409792&quot;}\" href=\"https:\/\/twitter.com\/VK_Intel\/status\/1498761290709409792\" rel=\"nofollow noopener\" target=\"_blank\">name-checked<\/a> by Conti multiple times throughout the chats. \u201cThey are not just making money, they are thinking about people and how to be more successful in the environment they have created.\u201d<\/p>\n<p class=\"paywall\">Many of the conversations are dull, daily chatter as group members become acquainted and even friendly with each other. On New Years Eve 2021 some wished each other the best for 2022; members tell others they have caught Covid-19; they have issues with connectivity (&quot;damn sorry my internet is dead&quot;); and they bond with conversations about their partners or exes. The water cooler conversations are a stark contrast to Conti\u2019s dark work.<\/p>\n<p class=\"paywall\">Despite some camaraderie, staff turnover is high. Members appear to frequently leave, which necessitates constant recruitment. As WIRED previously reported, during 2020 the Conti members, as part of the wider Trickbot cybercrime gang, <a href=\"https:\/\/www.wired.com\/story\/trickbot-malware-group-internal-messages\/\">discussed opening six offices in St. Petersburg<\/a> for new recruits. In July 2021, Mango messaged Stern and said they were interested in moving onto Moscow \u201ctime\u201d and starting a new company. Echoing the rise in remote working over the last two years, Stern replied: &quot;now it&#x27;s better to manage the team from a laptop.&quot;<\/p>\n<p class=\"paywall\">Most of the leaked Conti chat messages are DMs sent with Jabber, but the group coordinates attacks using Rocket.Chat, a slack-style platform that can be easily encrypted. Like Slack or Microsoft Teams, Rocket.Chat lists a group\u2019s channels down a left-hand panel.<\/p>\n<p class=\"paywall\">\u201cThere were channels created specifically for potential victims or infected victims,\u201d says \u00c9milio Gonzalez, a Canadian security researcher who studied the Conti files and re-created the group\u2019s Rocket.Chat <a data-offer-url=\"https:\/\/mobile.twitter.com\/res260\/status\/1498849174456000523\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/mobile.twitter.com\/res260\/status\/1498849174456000523&quot;}\" href=\"https:\/\/mobile.twitter.com\/res260\/status\/1498849174456000523\" rel=\"nofollow noopener\" target=\"_blank\">conversations<\/a>. Companies are listed as \u201cdead\u201d or \u201cdone\u201d in channel names. Each channel has two to four participants with different levels of seniority and responsibilities, Gonzalez says. \u201cThe conversation usually starts with credentials or access to a specific machine on the network of the victim.\u201d The attacks then progress from there. A review of February 2022 RocketChat messages by <a data-offer-url=\"https:\/\/theintercept.com\/2022\/03\/14\/russia-ukraine-conti-russian-hackers\/\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/theintercept.com\/2022\/03\/14\/russia-ukraine-conti-russian-hackers\/&quot;}\" href=\"https:\/\/theintercept.com\/2022\/03\/14\/russia-ukraine-conti-russian-hackers\/\" rel=\"nofollow noopener\" target=\"_blank\">The Intercept<\/a> shows the group discussing drug use and child sexual abuse content in general channels, and making anti-Semitic comments about Ukrainian president Volodymyr Zelensky.<\/p>\n<p class=\"paywall\">Beyond its chat messages, Conti uses common tools to organize. The team regularly references the <a href=\"https:\/\/www.wired.com\/story\/tor-anonymity-easier-than-ever\/\">Tor browser<\/a> for getting online and GPG and ProtonMail for encrypted emails, uses Privnote for self-destructing messages, and shares files through <a data-offer-url=\"http:\/\/file.io\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;http:\/\/file.io&quot;}\" href=\"http:\/\/file.io\" rel=\"nofollow noopener\" target=\"_blank\">file.io<\/a>, <a data-offer-url=\"http:\/\/qaz.im\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;http:\/\/qaz.im&quot;}\" href=\"http:\/\/qaz.im\" rel=\"nofollow noopener\" target=\"_blank\">qaz.im<\/a>, and Firefox\u2019s discontinued Send service. They also use databases, such as Crunchbase, to gather intelligence on the businesses they want to target.<\/p>\n<p class=\"paywall\">Within Conti\u2019s organizational structure is a team dedicated to open source intelligence that includes learning about potential threats. The group tried to purchase antivirus systems from security companies to test their malware against\u2014creating <a data-offer-url=\"https:\/\/news.sophos.com\/en-us\/2022\/03\/04\/countermeasures-and-observability-key-to-defending-against-attackers-trying-to-buy-security-products\/\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/news.sophos.com\/en-us\/2022\/03\/04\/countermeasures-and-observability-key-to-defending-against-attackers-trying-to-buy-security-products\/&quot;}\" href=\"https:\/\/news.sophos.com\/en-us\/2022\/03\/04\/countermeasures-and-observability-key-to-defending-against-attackers-trying-to-buy-security-products\/\" rel=\"nofollow noopener\" target=\"_blank\">fake companies to do so<\/a>. They circulate YouTube videos about the latest security research, watch what researchers say about them, and share news articles about the group. (One Conti member sent Stern a Russian summary of <a href=\"https:\/\/www.wired.com\/story\/trickbot-malware-group-internal-messages\/\">WIRED\u2019s February story about the Trickbot group<\/a> the day after it was published).<\/p>\n<p class=\"paywall\">As with any workplace, Conti members get frustrated with their colleagues. People don\u2019t reply to messages, they vanish while working (\u201che went to get a haircut\u201d), and they complain about long working hours. \u201cFor my part, I do not agree with the idea that I should be in touch 24 hours,\u201d Driver complained in March 2021. Working all hours of the day \u201cis a direct path to burnout,\u201d they said.<\/p>\n<p class=\"paywall\">The gang fines members who underperform or don\u2019t show up for work, <a data-offer-url=\"https:\/\/research.checkpoint.com\/2022\/leaks-of-conti-ransomware-group-paint-picture-of-a-surprisingly-normal-tech-start-up-sort-of\/\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/research.checkpoint.com\/2022\/leaks-of-conti-ransomware-group-paint-picture-of-a-surprisingly-normal-tech-start-up-sort-of\/&quot;}\" href=\"https:\/\/research.checkpoint.com\/2022\/leaks-of-conti-ransomware-group-paint-picture-of-a-surprisingly-normal-tech-start-up-sort-of\/\" rel=\"nofollow noopener\" target=\"_blank\">analysis of the chats<\/a> by security firm CheckPoint shows. \u201cI have 100 people here, half of them, even 10 percent, do not do what they need,\u201d Stern said to Mango in the summer of 2021. \u201cAnd they only ask for money, because they think that they are fucking useful.\u201d At another point, Stern scolds one person: \u201ceveryone works except for you.\u201d<\/p>\n<p class=\"paywall\">The Conti member Dollar is a particular pain. On January 20, 2022, the handle Cyberganster launched into a tirade about Dollar to Mango. \u201cLet&#x27;s get the dollar out of the game,\u201d Cyberganster writes. \u201cHe is a fucked up bastard.\u201d It\u2019s claimed that Dollar targeted hospitals with the group\u2019s ransomware despite being told not to. Conti members say they have a rule of not attacking hospitals or medical centers, although a May 2021 attack against <a data-offer-url=\"https:\/\/www.google.com\/search?q=conti+health+service+ireland&amp;oq=conti+health+service+ireland&amp;aqs=chrome..69i57.5316j0j9&amp;sourceid=chrome&amp;ie=UTF-8\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.google.com\/search?q=conti+health+service+ireland&amp;oq=conti+health+service+ireland&amp;aqs=chrome..69i57.5316j0j9&amp;sourceid=chrome&amp;ie=UTF-8&quot;}\" href=\"https:\/\/www.google.com\/search?q=conti+health+service+ireland&amp;oq=conti+health+service+ireland&amp;aqs=chrome..69i57.5316j0j9&amp;sourceid=chrome&amp;ie=UTF-8\" rel=\"nofollow noopener\" target=\"_blank\">Ireland\u2019s health service cost<\/a> the organization $600 million to recover from. Six days after the complaint from Cybergangster, Mango confronts Dollar. \u201cYou really [are] more problems than good,\u201d one message in a series of 11 says. Mango says \u201ceveryone constantly complains about you and gets angry\u201d and accuses Dollar of spoiling the gang\u2019s \u201creputation\u201d by targeting hospitals.<\/p>\n<p class=\"paywall\">Despite their everyday work life being exposed, the Conti group hasn\u2019t gone away. But the messages include a trail of personal details, such as the handles they use online, Bitcoin addresses, and email addresses. \u201cIf this information is true, it definitely makes life easier for law enforcement,\u201d says Tahiri. \u201cBy dismantling the group behind Trickbot\/Conti we can be sure that the whole infrastructure will suffer.\u201d It\u2019s something the group\u2019s members are well aware of: \u201cWe are already in the news,\u201d read one of the last messages sent before the leak.<\/p>\n<p><a href=\"https:\/\/www.wired.com\/story\/conti-leaks-ransomware-work-life\" target=\"bwo\" >https:\/\/www.wired.com\/category\/security\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/62312ee47a22075957fa019c\/master\/pass\/security-randsomewhere.jpg\"\/><\/p>\n<p><strong>Credit to Author: Matt Burgess| Date: Wed, 16 Mar 2022 11:00:00 +0000<\/strong><\/p>\n<p>A Ukrainian researcher leaked 60,000 messages from inside the Conti ransomware group. This is what they reveal.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10607],"tags":[714,21358],"class_list":["post-18519","post","type-post","status-publish","format-standard","hentry","category-security","category-wired","tag-security","tag-security-cyberattacks-and-hacks"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/18519","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=18519"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/18519\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=18519"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=18519"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=18519"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}