{"id":18545,"date":"2022-03-19T10:45:05","date_gmt":"2022-03-19T18:45:05","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2022\/03\/19\/news-12278\/"},"modified":"2022-03-19T10:45:05","modified_gmt":"2022-03-19T18:45:05","slug":"news-12278","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2022\/03\/19\/news-12278\/","title":{"rendered":"Conti Leaks Reveal the Ransomware Group\u2019s Links to Russia"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/62341097db39095ba1184ff2\/master\/pass\/security-conti-putin.jpg\"\/><\/p>\n<p><strong>Credit to Author: Matt Burgess| Date: Fri, 18 Mar 2022 11:00:00 +0000<\/strong><\/p>\n<p class=\"BylineWrapper-iiTsTb hAGfXd byline bylines__byline\" data-testid=\"BylineWrapper\" itemprop=\"author\" itemtype=\"http:\/\/schema.org\/Person\"><span itemprop=\"name\" class=\"BylineNamesWrapper-dbkCxf erRIa-D\"><span data-testid=\"BylineName\" class=\"BylineName-cKXFOb UCAzg byline__name\"><a class=\"BaseWrap-sc-TURhJ BaseText-fFzBQt BaseLink-gZQqBA BylineLink-eZnyPI eTiIvU mEZDb fNdcwQ bKZMMS byline__name-link button\" href=\"\/author\/matt-burgess\">Matt Burgess<\/a><\/span><\/span><\/p>\n<p>To revist this article, visit My Profile, then <a href=\"\/account\/saved\">View saved stories<\/a>.<\/p>\n<p>To revist this article, visit My Profile, then <a href=\"\/account\/saved\">View saved stories<\/a>.<\/p>\n<p><span class=\"lead-in-text-callout\">For years, Russia\u2019s<\/span> cybercrime groups have acted with relative impunity. The Kremlin and local law enforcement have <a data-offer-url=\"https:\/\/carnegieendowment.org\/2018\/02\/02\/why-russian-government-turns-blind-eye-to-cybercriminals-pub-75499\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/carnegieendowment.org\/2018\/02\/02\/why-russian-government-turns-blind-eye-to-cybercriminals-pub-75499&quot;}\" href=\"https:\/\/carnegieendowment.org\/2018\/02\/02\/why-russian-government-turns-blind-eye-to-cybercriminals-pub-75499\" rel=\"nofollow noopener\" target=\"_blank\">largely turned a blind eye<\/a> to disruptive ransomware attacks as long as they <a data-offer-url=\"https:\/\/www.nbcnews.com\/tech\/security\/kremlin-provides-safe-harbor-ransomware-rcna699\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.nbcnews.com\/tech\/security\/kremlin-provides-safe-harbor-ransomware-rcna699&quot;}\" href=\"https:\/\/www.nbcnews.com\/tech\/security\/kremlin-provides-safe-harbor-ransomware-rcna699\" rel=\"nofollow noopener\" target=\"_blank\">didn\u2019t target Russian companies<\/a>. Despite direct pressure on Vladimir Putin to <a data-offer-url=\"https:\/\/www.reuters.com\/technology\/biden-pressed-putin-call-act-ransomware-attacks-white-house-2021-07-09\/\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.reuters.com\/technology\/biden-pressed-putin-call-act-ransomware-attacks-white-house-2021-07-09\/&quot;}\" href=\"https:\/\/www.reuters.com\/technology\/biden-pressed-putin-call-act-ransomware-attacks-white-house-2021-07-09\/\" rel=\"nofollow noopener\" target=\"_blank\">tackle<\/a> ransomware groups, they\u2019re still intimately tied to Russia\u2019s interests. A recent leak from one of the most notorious such groups provides a glimpse into the nature of those ties\u2014and just how tenuous they may be.<\/p>\n<p class=\"paywall\">A cache of <a href=\"https:\/\/www.wired.com\/story\/conti-leaks-ransomware-work-life\/\">60,000 leaked chat messages and files<\/a> from the notorious Conti ransomware group provides glimpses of how the criminal gang is well connected within Russia. The documents, reviewed by WIRED and first published online at the end of February by an anonymous Ukrainian cybersecurity researcher who infiltrated the group, show how Conti operates on a daily basis and its <a href=\"https:\/\/www.wired.com\/story\/conti-ransomware-crypto-payments\/\">crypto ambitions<\/a>. They likely further reveal how Conti members have connections to the Federal Security Service (FSB) and an acute awareness of the operations of <a href=\"https:\/\/www.wired.com\/story\/sandworm-kremlin-most-dangerous-hackers\/\">Russia&#x27;s government-backed military hackers<\/a>.<\/p>\n<p class=\"paywall\">As the world was struggling to come to grips with the Covid-19 pandemic\u2019s outbreak and early waves in July 2020, cybercriminals around the world turned their attention to the health crisis. On July 16 of that year, the governments of the UK, US, and Canada <a href=\"https:\/\/www.wired.co.uk\/article\/russia-hack-coronavirus-vaccine\">publicly called out Russia\u2019s state-backed military hackers<\/a> for trying to steal intellectual property related to the earliest vaccine candidates. The hacking group <a href=\"https:\/\/www.wired.com\/story\/cozy-bear-dukes-russian-hackers-new-tricks\/\">Cozy Bear<\/a>, also known as Advanced Persistent Threat 29 (APT29), was attacking pharma businesses and universities using altered malware and known vulnerabilities, the three governments said.<\/p>\n<p class=\"paywall\">\u201cIt seemed to us that we were being followed, as unfamiliar cars were standing in the yard, two bodies were sitting in the car.\u201d<\/p>\n<p class=\"paywall\">Kagas, a Conti member, in a leaked chat<\/p>\n<p class=\"paywall\">Days later, Conti\u2019s leaders talked about Cozy Bear\u2019s work and referenced its ransomware attacks. Stern, the CEO-like figure of Conti, and Professor, another senior gang member, talked about setting up a specific office for \u201cgovernment topics.\u201d The details were <a href=\"https:\/\/www.wired.com\/story\/trickbot-malware-group-internal-messages\/\">first reported by WIRED in February<\/a> but are also included in the wider Conti leaks. In the same conversation, Stern said they had someone \u201cexternally\u201d who paid the group (although it is not stated what for) and discussed taking over targets from the source. \u201cThey want a lot about Covid at the moment,\u201d Professor said to Stern. \u201cThe cozy bears are already working their way down the list.\u201d<\/p>\n<p class=\"paywall\">\u201cThey reference the setting up of some long-term project and seemingly throw out this idea that they [the external party] would help in the future,\u201d says Kimberly Goody, director of cybercrime analysis at the security firm Mandiant. \u201cWe believe that&#x27;s a reference to if law enforcement actions would be taken against them, that this external party may be able to help them with that.\u201d Goody points out that the group also mentions Liteyny Avenue in St. Petersburg\u2014the home to <a data-offer-url=\"http:\/\/www.encspb.ru\/object\/2804003069;jsessionid=52F355A5014CB3E3C880A4763C7DFEC2?lc=en\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;http:\/\/www.encspb.ru\/object\/2804003069;jsessionid=52F355A5014CB3E3C880A4763C7DFEC2?lc=en&quot;}\" href=\"http:\/\/www.encspb.ru\/object\/2804003069;jsessionid=52F355A5014CB3E3C880A4763C7DFEC2?lc=en\" rel=\"nofollow noopener\" target=\"_blank\">local FSB offices<\/a>.<\/p>\n<p class=\"paywall\">While evidence of Conti\u2019s direct ties to the Russian government remains elusive, the gang\u2019s activities continue to fall in line with national interests. \u201cThe impression from the leaked chats is that the leaders of Conti understood that they were allowed to operate as long as they followed unspoken guidelines from the Russian government,\u201d says Allan Liska, an analyst for the security firm Recorded Future. \u201cThere appeared to have been at least some lines of communication between the Russian government and Conti leadership.\u201d<\/p>\n<p class=\"BylineWrapper-iiTsTb gRgFYc byline bylines__byline\" data-testid=\"BylineWrapper\" itemprop=\"author\" itemtype=\"http:\/\/schema.org\/Person\"><span itemprop=\"name\" class=\"BylineNamesWrapper-dbkCxf erRIa-D\"><span data-testid=\"BylineName\" class=\"BylineName-cKXFOb irUMly byline__name\">Matt Burgess<\/span><\/span><\/p>\n<p class=\"BylineWrapper-iiTsTb gRgFYc byline bylines__byline\" data-testid=\"BylineWrapper\" itemprop=\"author\" itemtype=\"http:\/\/schema.org\/Person\"><span itemprop=\"name\" class=\"BylineNamesWrapper-dbkCxf erRIa-D\"><span data-testid=\"BylineName\" class=\"BylineName-cKXFOb irUMly byline__name\">Matt Burgess<\/span><\/span><\/p>\n<p class=\"paywall\">In April 2021, Mango, a key Conti manager who helps organize the group, asked Professor: \u201cDo we work on politics?\u201d When the Professor asked for more information, Mango shared chat messages they had with one person using the handle JohnyBoy77\u2014all the members of the gang use monikers to help hide their identities. The pair were discussing people who \u201cwork against the Russian Federation\u201d and the potential interception of information about them. JohnyBoy77 asked whether the Conti members could access data of someone linked to Bellingcat, the open source investigative journalists who have exposed <a href=\"https:\/\/www.wired.com\/story\/roman-dobrokhotov-insider-russia-gru-bellingcat\/\">Russian hackers<\/a> and <a data-offer-url=\"https:\/\/www.google.com\/search?q=wired.com+bellingcat&amp;oq=wired.com+bellingcat&amp;aqs=chrome.0.69i59.2042j0j1&amp;sourceid=chrome&amp;ie=UTF-8\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.google.com\/search?q=wired.com+bellingcat&amp;oq=wired.com+bellingcat&amp;aqs=chrome.0.69i59.2042j0j1&amp;sourceid=chrome&amp;ie=UTF-8&quot;}\" href=\"https:\/\/www.google.com\/search?q=wired.com+bellingcat&amp;oq=wired.com+bellingcat&amp;aqs=chrome.0.69i59.2042j0j1&amp;sourceid=chrome&amp;ie=UTF-8\" rel=\"nofollow noopener\" target=\"_blank\">secret networks of assassins<\/a>.<\/p>\n<p class=\"paywall\">In particular, JohnyBoy77 wanted information linked to Bellingcat\u2019s investigation into the poisoning of Russian opposition leader <a data-offer-url=\"https:\/\/www.bellingcat.com\/news\/uk-and-europe\/2020\/12\/14\/fsb-team-of-chemical-weapon-experts-implicated-in-alexey-navalny-novichok-poisoning\/\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.bellingcat.com\/news\/uk-and-europe\/2020\/12\/14\/fsb-team-of-chemical-weapon-experts-implicated-in-alexey-navalny-novichok-poisoning\/&quot;}\" href=\"https:\/\/www.bellingcat.com\/news\/uk-and-europe\/2020\/12\/14\/fsb-team-of-chemical-weapon-experts-implicated-in-alexey-navalny-novichok-poisoning\/\" rel=\"nofollow noopener\" target=\"_blank\">Alexey Navalny<\/a>. They asked about Bellingcat\u2019s files on Navalny, referenced access to passwords of a Bellingcat member, and mentioned the FSB. In response to the Conti conversations, Bellingcat\u2019s executive director, Christo Grozevm, <a data-offer-url=\"https:\/\/twitter.com\/christogrozev\/status\/1498388095582019589\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/twitter.com\/christogrozev\/status\/1498388095582019589&quot;}\" href=\"https:\/\/twitter.com\/christogrozev\/status\/1498388095582019589\" rel=\"nofollow noopener\" target=\"_blank\">tweeted that the group<\/a> had previously received a tip that the FSB had been speaking with a cybercrime group about hacking its contributors. \u201cI mean, are we patriots or what?\u201d Mango asked Professor about the files. \u201cOf course we are patriots,\u201d they replied.<\/p>\n<p class=\"paywall\">Russian patriotism is constant throughout the Conti group, which has many of its members based in the country. However, the group is international in its scope, has members in Ukraine and Belarus, and has <a data-offer-url=\"https:\/\/krebsonsecurity.com\/2021\/06\/how-does-one-get-hired-by-a-top-cybercrime-gang\/\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/krebsonsecurity.com\/2021\/06\/how-does-one-get-hired-by-a-top-cybercrime-gang\/&quot;}\" href=\"https:\/\/krebsonsecurity.com\/2021\/06\/how-does-one-get-hired-by-a-top-cybercrime-gang\/\" rel=\"nofollow noopener\" target=\"_blank\">links to members farther afield<\/a>. Not all of the group agree with Russia\u2019s invasion of Ukraine, and members have <a data-offer-url=\"https:\/\/theintercept.com\/2022\/03\/14\/russia-ukraine-conti-russian-hackers\/\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/theintercept.com\/2022\/03\/14\/russia-ukraine-conti-russian-hackers\/&quot;}\" href=\"https:\/\/theintercept.com\/2022\/03\/14\/russia-ukraine-conti-russian-hackers\/\" rel=\"nofollow noopener\" target=\"_blank\">discussed the war<\/a>. \u201cWith the globalization of these ransomware groups, just because Conti leadership aligned well with Russian politics does not mean that the affiliates felt the same way,\u201d Liska says. In one series of conversations dating back to August 2021, Spoon and Mango chatted about their experiences in Crimea. Russia invaded Crimea and annexed the region from Ukraine in 2014, a move that Western leaders say they <a data-offer-url=\"https:\/\/www.bbc.co.uk\/news\/uk-60745961\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.bbc.co.uk\/news\/uk-60745961&quot;}\" href=\"https:\/\/www.bbc.co.uk\/news\/uk-60745961\" rel=\"nofollow noopener\" target=\"_blank\">should have done more to stop<\/a>. The area was beautiful, they said, but Spoon hadn\u2019t visited for 10 years. \u201cI&#x27;ll have to go and check it out next year,\u201d Spoon said. &quot;Russian Crimea.\u201d<\/p>\n<p class=\"paywall\">While members of the group reference Russian interests or government agencies, it&#x27;s unlikely they are working on behalf of officials. Senior members of Conti may have contacts, but rank-and-file coders and programmers aren\u2019t likely to be as well connected. \u201cI think it&#x27;s really a more limited subset of actors that actually might have those direct relationships, rather than group operations in its entirety,\u201d Goody says.<\/p>\n<p class=\"paywall\">Since Conti\u2019s internal files were published on February 27 and 28, the group has continued to work. \u201cThey definitely reacted,\u201d says J\u00e9r\u00f4me Segura, director of threat intelligence at the security firm Malwarebytes. \u201cYou can see from the chats that they were closing some stuff and switching to private chats. But it was really business as usual.\u201d The group has continued to post the names and files of ransomware victims on its website in the weeks since the leak.<\/p>\n<p class=\"paywall\">Conti\u2019s hacking continues despite security researchers using the details in the Conti leaks to potentially name the group\u2019s individual members. The greater threat to the group, however, could come from Russia\u2019s government itself. On January 14, Russia took its most significant action yet against a ransomware gang. The <a href=\"https:\/\/www.wired.com\/story\/russia-revil-ransomware-arrests-ukraine\/\">FSB arrested 14 members of the REvil group<\/a> after tip-offs from US officials, although the group had largely been dormant for several months. \u201cAction will be taken if the Russian authorities feel the leaders of Conti have outlived their usefulness, but if Conti is able to continue on or if they are able to rebrand, there will likely be no action,\u201d Liska predicts. \u201cIf action is taken, it will likely be similar to the action taken against members of REvil, with a series of showy arrests, only to quietly release most of those arrested a month or so later.\u201d<\/p>\n<p class=\"paywall\">It\u2019s unclear whether authorities will take similar actions against Conti members. But they have been paranoid even before their details were leaked. In November 2021, Conti member Kagas sent a flustered message to Stern. \u201cIt seemed to us that we were being followed, as unfamiliar cars were standing in the yard, two bodies were sitting in the car,\u201d they wrote. Kagas referenced a court case and that they would stop working until it was over. \u201cLawyers say that until the 13th it is better to sit quietly and do nothing,\u201d Kagas said. \u201cLive an ordinary life. And then we&#x27;ll see what happens.\u201d<\/p>\n<p><a href=\"https:\/\/www.wired.com\/story\/conti-ransomware-russia\" target=\"bwo\" >https:\/\/www.wired.com\/category\/security\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/62341097db39095ba1184ff2\/master\/pass\/security-conti-putin.jpg\"\/><\/p>\n<p><strong>Credit to Author: Matt Burgess| Date: Fri, 18 Mar 2022 11:00:00 +0000<\/strong><\/p>\n<p>Members of the Conti ransomware group may act in Russia\u2019s interest, but their links to the FSB and Cozy Bear hackers appear ad hoc.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10607],"tags":[714,21358],"class_list":["post-18545","post","type-post","status-publish","format-standard","hentry","category-security","category-wired","tag-security","tag-security-cyberattacks-and-hacks"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/18545","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=18545"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/18545\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=18545"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=18545"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=18545"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}