Last month, after the Conti group publicly supported Russia’s invasion of Ukraine, a pro-Ukrainian member leaked thousands of internal chat conversations from the group. The conversations took place between January 2021 through February 2022. The member also leaked old source code from the group, allowing threat researchers and law enforcement to analyze the malware. Over the weekend, the former Conti member, now using the Twitter handle “Conti Leaks,” uploaded the source code for Conti version 3 to VirusTotal and posted the link to Twitter. The version 3 source code is much newer and like the previous version, it is a Visual Studio solution that allows anyone with access to compile the ransomware locker and decryptor. Although it is good that threat researchers now have a decryptor for this version of Conti, it could lead to new ransomware variants being created now that the malware is public.
Using Microsoft Sentinel to Detect Confluence CVE-2022-26134 Exploitation
By Akshay Rohatgi and Randy Pargman About this Student Research Project Binary Defense’s mission is