I’ve recently took the time and effort to obtain access to and data mine the recently leaked Conti ransomware gang internal communication looking for IoCs (Indicators of Compromise) including relevant OSINT artifacts which lead me to custom-tailored fashion brands courtesy of some of the gang members including several “in the works” re-branded upcoming ransomware as a service brand names including but let’s not forget to access to actual MD5’s, C&C server locations including a vast portfolio of IPs managed and operated by the Conti ransomware gang which I’ll expose in this post potentially undermining the Internet-connected infrastructure of one of the Web’s primary and most popular ransomware brands potentially assisting U.S Law Enforcement on its way to track down and monitor the cybercriminals behind these campaigns.
Sample screenshots and infographics indicating the current state of the Internet-connected infrastructure of the Conti ransomware gang: