[TheRecord] Conti gang threatens to dump victim data if ransom negotiations leak to reporters

The Conti ransomware gang has published a rare public statement today threatening hacked companies that they will leak their stolen files if details or screenshots of the ransom negotiations process are leaked to journalists.

These ransom negotiations usually take place after Conti (or any other ransomware gang) breaches a company and encrypts their files. A ransom note is left on affected desktops, with instructions on how the victim could contact the attackers.

Typically, ransomware gangs prefer leaving an email address where the victim can reach out, but more often than not, they provide a unique URL to a so-called โ€œpayment siteโ€ where victims are asked to log in and talk to the attackers via a web-based chat feature.

If an employee of the attacked company uploads a copy of the ransom note or the ransomware binary on malware-scanning portals like VirusTotal, the details included in these ransom notes, including links to the web-based chat feature, can also be discovered by security researchers, who often access these negotiations pages and sometimes share them on social media.

#BlackMatter #ransomware making wrong choices again pic.twitter.com/xZq7himn1o

โ€” ๐•ฏ๐–’๐–Ž๐–™๐–—๐–ž ๐•พ๐–’๐–Ž๐–‘๐–ž๐–†๐–“๐–Š๐–™๐–˜ (@ddd1ms) September 20, 2021

๐ŸŒ Conti (Ryuk) #Ransomware group just hit a big firm, the ransom demand is 8.5 million dollars ๐Ÿšจ

They split the ransom into one hundred transactions, 850,0000 each to 100 different bitcoin wallets to not get caught by law enforcement ๐Ÿ’ธ#Conti pic.twitter.com/QIwriRAmXz

โ€” DarkFeed (@ido_cohen2) September 24, 2021

Over the past few years, news outlets specialized in cybersecurity coverage have often worked with security researchers to find links to these secret chats in files uploaded on VirusTotal.

Reporters then used the screenshots to reveal details about ransomware incidents โ€” especially when the hacked organization wasnโ€™t upcoming with such information in the first place.

Most of these screenshots typically show a banal negotiations process between the ransomware gangs and the victim, with the two working to agree on a final ransom fee, and then the ransomware gang sharing Bitcoin addresses where they ask for the payment.

However, other screenshots have also shown information about the attack itself, how the victim was breached, what kind of data the attackers stole from the victimโ€™s network, threats against a victim and its employees, or how companies were trying to disguise payments to groups sanctioned by the US Treasury.

Today, many ransomware gangs like to delude themselves that they are running a โ€œprofessional backup & recoveryโ€ or โ€œpenetration testingโ€ fantasy business. These leaked screenshots show the true nature of their actions, all being nothing more than a good old extortion scheme.

Conti angered of recent JVCKenwood negotiations leak

Across the years, screenshots from almost all ransomware gangsโ€™ negotiations have leaked on social media or have been shared with reporters.

But in a message posted on its blog today, the Conti gang said that it would not tolerate incidents where screenshots of its negotiations process are leaked online anymore.

Although no particularly โ€œdamagingโ€ screenshot leak occurred, the Conti group cited its recent attack against Japanese electronics maker JVCKenwood as the reason it has taken this step. In Contiโ€™s own words, below:

For instance, yesterday, we have found that our chat with JVCKenwood whom we hit a week ago got reported to the journalists. Despite what is said in the article, the negotiations were going in accordance with a normal business operation. However, since the publication happened in the middle of negotiations it resulted in our decision to terminate the negotiations and publish the data. JVCKenwood has been already informed. Moreover, this week we have once again spotted screenshots from our negotiation chats circulating over social media.

As a result, the Conti gang said it is introducing new rules meant to penalize victims or security researchers who leak screenshots of its ransom negotiations chats to reporters:

If we see a clear indication of our negotiations being sent to the media we will terminate the negotiations and dump all the files on our blog. We are the best team and you can google what estimated revenue we have. This became possible only due to our outstanding reputation. Thus, if we need to sacrifice another 10 mln to cut the negotiations but protect our name; donโ€™t doubt โ€“ we will do so.If we see our chats in public we will also dump your files. If this happens after the ransom is already paid by the target who shared our chats, we will dump somebody elseโ€™s files as retaliation. We will not care if you directly shared our chats with the media/researchers or if they extracted it from VirusTotal after you uploaded our samples there. Since, the security firms who share chats via their pocket journalists have no concept responsibility, therefore, we will assign responsibilty to the target who is in the chat. We are not advocating collective responsibility via collective punishment, but if this is the only option we will do so.

Image: The Record

But the reality of these new rules is that the Conti gang is trying to control the media coverage around its attacks.

The group is effectively trying to put the blame for failed negotiations and the subsequent data leaks on security researchers and journalists โ€” the only two categories of people who can find these chats in the first place โ€” instead of the actual attackers.

With the Biden administration having turned its attention on ransomware attacks, the Conti gang is desperately trying to keep its name out of media coverage.

Itโ€™s a clever use of whataboutism and intimidation from last monthโ€™s second most prolific ransomware gang.

#ransomware victims, September 2021#LockBit ๐Ÿฅ‡#Conti ๐Ÿฅˆ pic.twitter.com/9zG35UlxVW

โ€” ๐•ฏ๐–’๐–Ž๐–™๐–—๐–ž ๐•พ๐–’๐–Ž๐–‘๐–ž๐–†๐–“๐–Š๐–™๐–˜ (@ddd1ms) September 30, 2021

Ransomware gangs try to control narrative through press releases

Furthermore, the Conti announcement is just the latest in a long series of press releases that ransomware gangs have begun publishing on their blogs (leak sites) and underground forums this year.

Through simple two-sentence statements or long-winded announcements, various ransomware groups have announced new rules for their โ€œoperations.โ€

Groups like LockBit, Darkside, or BlackMatter have pledged not to attack critical infrastructure in an attempt to lift US political pressure against their operations but often broke their own rules for the sake of a big score.

The Ragnar_Locker gang also threatened victims to dump their data if they called law enforcement agencies, in another brazen example of a gang trying to intimidate victims.

In addition, the Grief and DoppelPaymer gangs also threatened to wipe victimsโ€™ servers if they used professional ransomware negotiators, knowing that negotiators would warn the victim against paying the ransom because the two ransomware operations are effectively sanctioned by the US (via their associations with the Evil Corp cybercrime gang).

All of these are examples of how ransomware gangs try to intimidate victims and control their public image around their attacks. But the reality is that these rules mean nothing for the ransomware gangs, which have no qualms in breaking them for the sake of a big payment.

The post Conti gang threatens to dump victim data if ransom negotiations leak to reporters appeared first on The Record by Recorded Future.

Source: Read More (The Record by Recorded Future)

You might be interested in …

[ThreatPost] Microsoft MSHTML Flaw Exploited by Ryuk Ransomware Gang

All posts, ThreatPost

Microsoft and RiskIQ researchers have identified several campaigns using the recently patched zero-day, reiterating a call for organizations to update affected systems. Source: Read More (Threatpost)

Read More

[SecurityWeek] DevOps Security Startup Cycode Raises $20 Million

All posts, Security Week

Cycode, an Israeli startup focused on securing DevOps tools, today announced that it has raised $20 million in Series A funding, which brings the total capital raised by the company up to $25 million. read more Source: Read More (SecurityWeek RSS Feed)

Read More

[SecurityWeek] Audit: Cybersecurity Weak for Many Kansas School Districts

All posts, Security Week

Many Kansas school districts arenโ€™t taking basic steps to protect their computer systems and the privacy of sensitive information collected about students, according to a legislative audit release Tuesday. read more Source: Read More (SecurityWeek RSS Feed)

Read More

Leave a Reply

Your email address will not be published.

This site uses Akismet to reduce spam. Learn how your comment data is processed.