Skip to content
arrow-alt-circle-up icon

Cyber Incident Call

arrow-alt-circle-up icon

00800 1744 0000

arrow-alt-circle-up icon

NW Our Technology2

When the hackers get hacked:

a blog series unveiling the Conti ransomware family

Or read part 2: dissecting the attack

On 24 February 2022, Russia declared war on Ukraine and started its invasion. Subsequently, many ransomware gangs and other hacking groups started announcing with whom their allegiances lie [1]



After expressing their explicit support on 25 February 2022 for the Russian government and threatening to "strike back at an enemy's critical infrastructure", the group operating the Conti ransomware family has faced severe backlash. Not only from cyber security professionals worldwide but also anti-Russian members within their own organisation [2] [3] [4]. A Ukrainian security researcher [5] under the alias ContiLeaks [6] took up digital arms and started leaking internal chats, source files, screenshots, manuals and other files.  We will report on these leaks in a series of blog posts to come. Our goal is to understand better how the ransomware gang operates, who is involved and when, what challenges they face, and how are they organised. As we proceed with our research, we will report on interesting, noteworthy and critical findings from the leaks.  To kick off the blog post series, we describe Conti, present an overview of the typical organisation of ransomware groups internally and present the data that has been leaked so far. 

Who is Conti? 

The Conti ransomware family was first seen in August 2020 and is allegedly operated by the Wizard Spider group [7] [8]. The Wizard Spider group consists of approximately 80 members and is based in and around St Petersburg in Russia. The group has been extorting companies in western countries using ransomware since at least 2017.   First, the group extorted victims using Hermes ransomware between February 2017 and 2018. Then, the group switched to Ryuk ransomware between 2018 and 2020 [9] [10]. Subsequently, the group switched over to Conti ransomware and has been attacking companies using that ransomware until now.   In the recent leaks, it is apparent that the group allegedly has received over $2,700,000,000 in BTC between April of 2017 and February 2022 [11]. This money likely originates from ransom payments made by victims of the group. 

How are ransomware gangs organized? 

Northwave created a framework on what roles there are inside a ransomware gang based on key insights from dealing with ransomware incidents. As part of our incident response process, we investigate the root cause of such incidents and talk to the actors behind the ransomware attack. From our experiences, we deducted that there are currently seven distinct roles within a ransomware attack. Each role follows from the objective of the attack's specific activities. We would see each of these roles fulfilled by the same actor in the past. However, in recent years, we have seen that more and more actors are specialising in a single role within this model. 

conti image 2

As part of a blog series called Inside the world of ransomware, we wrote a more detailed overview of the different roles within a ransomware attack [12].  We will investigate if the roles identified by Northwave are also identifiable in the leaked documents and describe how the different actors interact. 

Leaked data 

The first leak took place on 27 February. In the days following, more data has leaked. As it stands, the current number of leaked files is 39. Below we constructed an overview of all the leaked files and a short description of what the leak contains. 
Original file name  Description 
1.tgz  Jabber chat logs 2021-2022 
2.tgz  Jabber chat logs 2020 
Screenshot from 2021-12-15 21-26-28.png  Chat with victims 
Screenshot from 2021-12-06 22-57-52.png  Chat with victims 
bazar_bots_domains_html.7z  Bazar panel 
bazar_bots_comments_html.7z  Bazar panel 
Screenshot from 2021-12-06 22-58-32.png  Chat interface 
Screenshot from 2021-12-15 17-29-58.png  Cobalt Strike interface 
Screenshot from 2021-12-15 17-31-08.png  Cobalt Strike interface 
Screenshot from 2021-12-15 21-26-28.png  Chat with victims  Encrypted archive with source code 
bazar_bots.7z  Bazar panel  .git folder with js and c++ refs  Source code  Source code  Source code  Source code  Source code  Source code  Checks ebay account balance for given username and password  Laravel application  go files that parse IPs and store them in a local postgres database  Source code  Source code  Jabber chat log 26-02-2022  Jabber chat log 27-02-2022  Jabber chat log 28-02-2022 
FMvM2_PXsAMdOof.png  Conti storage server 
FMvNB1mWUA4l4ud.png  Screenshot with networking configs 
FMvNWvqWYAEZ298.png  Screenshot with networking/wireshark configs 
rocket-chat.tgz  Rocket chats 2020-2022 
trickconti-forum.7z  Manuals/how-to's 
3.tgz  Binman/docs repo 
FMwnZodWYAE1vDX.png  Screenshot of jabber chat with privnotes 
trickbot-command-dispatcher-backend.tgz  Erlang source code of application 
trickbot-data-collector-backend.tgz  Erlang source code of application 
FMw3KrXXEAUXAQJ.png  Sergei Loguntsov ( aka. begemot 
conti_locker.7z  Conti source without locker src. 
jabber_logs.7z  Jabber chat logs 1st and 2nd of March 2022 


We will add any additional leaks to this list. The list was updated last on 2-3-2022 at 22:00 UTC.  So far, the leaks seem only to contain internal communication of the Conti group. Northwave did not identify any data of her clients yet in the leaks. Of course, Northwave will closely monitor this and update any of her clients if their data becomes apparent in the leaks.