Conti has been Pwned… and their data is fascinating

Conti has been Pwned… and their data is fascinating

Let me take you back a week or so – in the early days of what we can only describe as the human tragedy of massive proportions that is unfolding in Eastern Europe, a number of hacking groups began to declare their support for each side of the conflict. Anonymous, for example, declared against Russia. Conti, the most prolific and rapacious ransomware group in existence did the opposite.

Within days, gigabytes of Conti’s chat logs and tactics, techniques and procedures started to be leaked. It’s still unclear if they were hacked, or if the leaks were an inside job by members who hold a different view of the conflict to their leaders (who themselves are no doubt right now asking how they were ‘pwned’ so quickly!). However, what is clear is that the leaked data is a treasure trove of intelligence for cyber-defenders around the world.

A number of folk have been working through the data – here’s some of the highlights that are available in the public domain:

A number of other extremely good threat intelligence production firms have also generated their own analysis of the Conti data (which is well worth accessing if you are able to do so via a paid subscription – there are a few I’d recommend if folk are interested to know more).

The best cyber defenders out there know how to think like an attacker and use this knowledge to continuously harden and improve their cyber posture. Wars like the one playing out in Ukraine rarely result in good outcomes – hopefully one small positive among many negatives is that the cyber-intelligence that became available this week will help organisations the world over to make themselves less susceptible to being exploited by malicious actors well into the future.?

Christopher Wardrop

Manager Cyberspace Operations

2 年

Great summary Dirk.

回复

要查看或添加评论,请登录

社区洞察

其他会员也浏览了