<?xml version="1.0" encoding="UTF-8" ?><!-- generator=Zoho Sites --><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><atom:link href="https://www.gtconsult.com/blogs/tag/ransomware/feed" rel="self" type="application/rss+xml"/><title>GTconsult - Blog #ransomware</title><description>GTconsult - Blog #ransomware</description><link>https://www.gtconsult.com/blogs/tag/ransomware</link><lastBuildDate>Wed, 18 Feb 2026 07:40:34 -0800</lastBuildDate><generator>http://zoho.com/sites/</generator><item><title><![CDATA[CONTI Ransomware Leak]]></title><link>https://www.gtconsult.com/blogs/post/conti-ransomware-leak</link><description><![CDATA[<img align="left" hspace="5" src="https://www.gtconsult.com/CONTI Leak Blog/CONTI Hacked.png"/>An insight into how CONTI the ransomware organization in a strange stroke of irony, have had their data leaked online, and what we need to know about them.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_msPgGU1wSRGHx1rjDPHRYg" data-element-type="section" class="zpsection "><style type="text/css"> [data-element-id="elm_msPgGU1wSRGHx1rjDPHRYg"].zpsection{ border-radius:1px; } </style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_ad5MXF6hSMq3uI2U3oa4Lg" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_aJ7QeWn3RnKnJWJjL01_IA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_rJ4KvsiTQwOnRNDaQjKXqw" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-align-center " data-editor="true">In a strange stroke of irony, the ransomware group CONTI has had all of their private messages and internal documents leaked</h2></div>
<div data-element-id="elm_Tif7a19uRnupJeiiEz2D_w" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_Tif7a19uRnupJeiiEz2D_w"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><div style="color:inherit;"><p style="text-align:left;">My how the tables have turned.&nbsp; An organization that since 2017 has been infiltrating organizations, dropping ransomware payloads to encrypt and exfiltrate data to later be leveraged for a ransom, has a cool cold slap to the face with a large trout case of karma.&nbsp; CONTI leaks on twitter started dropping files which revealed the internal chats of the organization on February the 27<sup>th</sup>.&nbsp; Since then, more files have been uploaded, showing the recruitment process of hiring new employees, induction documentation and HOWTO’s on how to hack and deploy the ransomware payloads.</p><p style="text-align:left;"><br></p><p style="text-align:left;"><img src="/CONTI%20Leak%20Blog/contiblog1.png"><br></p><p style="text-align:left;"><br></p><p></p><p style="text-align:left;">The insight into this organization is no different to any other, they have sales, marketing, administration, payroll and developers.&nbsp; </p><p style="text-align:left;"><br></p><p style="text-align:left;"><img src="/CONTI%20Leak%20Blog/contiblog2.png"><br></p><p style="text-align:left;"><br></p><p></p><p style="text-align:left;">They seem to have normal hours and encourage each other to get sleep if they are working too hard.&nbsp; </p><p style="text-align:left;"><br></p><p style="text-align:left;"><img src="/CONTI%20Leak%20Blog/contiblog3.png"><br></p><p style="text-align:left;"><br></p><p></p><p style="text-align:left;">And had pretty good dashboards to show the company's current pipeline, just like we all have.&nbsp; A ransomware CRM if you will.</p><p style="text-align:left;"><br></p><p style="text-align:left;"><img src="/CONTI%20Leak%20Blog/contiblog4.png"><br></p><p style="text-align:left;"><br></p><p></p><p style="text-align:left;">The truth is they were running one hell of an enterprise, in fact this is what their BTC account looked like.</p><p></p><p style="text-align:left;">Yup you read that correctly 65,498 Bitcoins.&nbsp; I made a easy to review graph below based on where you are to understand just how much that is, cause its a lot.</p><p style="text-align:left;"><br></p><p style="text-align:left;"><img src="/CONTI%20Leak%20Blog/contiblog.jpg"><br></p><p style="text-align:left;"><br></p><p style="text-align:left;">ZAR = R 43 841 065&nbsp;425</p><p style="text-align:left;">USD = $ 2 848 274 310</p><p style="text-align:left;">GBP = £ 2 124 532&nbsp;403</p><p style="text-align:left;"><br></p><p style="text-align:left;">I read one of the induction documents labeled “old school spirit” which was translated from the Russian “дух старой школы”.&nbsp; Get the job done culture was created from the very beginning and ensuring that clear simple code was used with only results matter approach. </p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">Look, all of this was to defraud companies from money, and that’s illegal.&nbsp; However, I am still impressed at the speed this organization worked at, their internal training process, and their overall focus on getting things done.&nbsp; It’s why they became the biggest in the world.&nbsp; </p><p style="text-align:left;">How can organizations even think of defending themselves against a super sophisticated team when they themselves don’t even have the most basic processes in place in their own organizations?</p><p style="text-align:left;"><br></p><p style="text-align:left;">The bottom line is if companies are going to defend themselves from ransomware attacks in the future, they are going to have to learn this “Get if done” mentally we see from the CONTI organization.&nbsp; But not on profit and sales, it must be a focus on IT Security and Company culture. &nbsp;Does everyone in the company have MFA enabled with a really strong password that is only used in one place?&nbsp; Do you have security dashboards to show potential threats? Do you have training materials to help educate everyone? Do you have an open chat where people can ask questions and get answers?&nbsp; It's not the be all and end all but it's for sure a great place to get started.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">&nbsp;</p></div></div>
</div><div data-element-id="elm_xRDyatnJbp_Czw2e18Vqnw" data-element-type="imageheadingtext" class="zpelement zpelem-imageheadingtext "><style> @media (min-width: 992px) { [data-element-id="elm_xRDyatnJbp_Czw2e18Vqnw"] .zpimageheadingtext-container figure img { width: 254px !important ; height: 212px !important ; } } @media (max-width: 767px) { [data-element-id="elm_xRDyatnJbp_Czw2e18Vqnw"] .zpimageheadingtext-container figure img { width:254px ; height:212px ; } } [data-element-id="elm_xRDyatnJbp_Czw2e18Vqnw"].zpelem-imageheadingtext{ border-radius:1px; margin-block-start:-10px; } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="true" data-mobile-image-separate="false" class="zpimageheadingtext-container zpimage-with-text-container zpimage-align-left zpimage-size-custom zpimage-mobile-fallback-custom hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><source class="tablet-image-source" media="(max-width: 991.8px) and (min-width: 768px)" srcset=""><img class="zpimage zpimage-style-none zpimage-space-none " src="/Office%20365%20Complete%20Protection/O365CP%20Banner-1.png" data-src="/Office%20365%20Complete%20Protection/O365CP%20Banner-1.png" width="254" height="212" loading="lazy" size="custom" data-lightbox="true"/></picture></span></figure><div class="zpimage-headingtext-container"><h3 class="zpimage-heading zpimage-text-align-left " data-editor="true">Office 365 Complete Protection</h3><div class="zpimage-text zpimage-text-align-left " data-editor="true"><p><span style="color:inherit;">We have categorised all the features and settings in the Admin Center, Secure Score, Security Center, Compliance Centre and Exchange Online Protection into modules that our experienced team can assist your team deploy with a hands on approach .&nbsp;&nbsp;</span></p><p><span style="color:inherit;"><br></span></p><p><span style="color:inherit;">We ensure that the biggest asset in your company, the people, are educated about the changes, and educated on how to deal with dodgy emails in the future.&nbsp; We protect your backend systems alerting your team to phishy mails, and dodgy looking logins and much more.</span><br></p></div>
</div></div></div><div data-element-id="elm_so7zA6fJhJozA36pQ0uvwQ" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_so7zA6fJhJozA36pQ0uvwQ"].zpelem-button{ border-radius:1px; margin-block-start:-5px; } </style><div class="zpbutton-container zpbutton-align-right "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none zpbutton-full-width " href="https://www.gtconsult.com/office-365-complete-protection" target="_blank"><span class="zpbutton-content">Find out more about Office 365 Complete Protection</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Tue, 01 Mar 2022 13:20:02 +0000</pubDate></item></channel></rss>