Days after the Conti ransomware group broadcasted a pro-Russian message pledging its allegiance to Vladimir Putin’s ongoing invasion of Ukraine, an anonymous security researcher using the Twitter handle @ContiLeaks has leaked the syndicate’s internal chats.
The file dump, published by malware research group VX-Underground, is said to contain 13 months of chat logs between affiliates and administrators of the Russia-affiliated ransomware group from June 2020 to February 2022, in a move that’s expected to offer unprecedented insight into the criminal enterprise’s inner workings.
“Glory to Ukraine,” the leaker said in their message.
The shared conversations show that Conti used fake front companies to attempt to schedule product demos with security firms like CarbonBlack and Sophos to obtain code signing certificates, with the operators working in scrum sprints to complete the software development tasks.
Additionally, the messages confirm the shutdown of the TrickBot botnet last week as well as highlight the Conti group’s close relationship with the TrickBot and Emotet malware gangs, the latter of which was resurrected late last year through TrickBot.
A message sent by one of the members of the group on February 14, 2022 goes: “TrickBot does not work. This project was terminated. “
On top of that, the leaker is also believed to have released the source code associated with TrickBot’s command dispatcher and data collector modules, not to mention the ransomware group’s internal documentation, its administrative panel, and a password-protected archive containing the source code for the decryptor and the builder.
![]() |
Source: Emilio Gonzalez (@res260) |
![]() |
Source: Emilio Gonzalez (@res260) |
The development comes as the Russo-Ukrainian conflict has splintered the cybercrime underground into two warring factions, with a growing number of hacking actors picking sides between the two countries on the digital front.
The Conti team posted a blog on last week’s dark web portal, in which it pledged its support for the Russian invasion and warned that it would retaliate against any infrastructure critical if Russia was hit by cyber- or military attack.
It later retracted, saying that it did not support any government, and condemned the war, but stating again that they would use their resources to strike back at American cyber aggression if peace and well-being of citizens were in danger. “
The ContiLeaks saga is part of a wider effort by hacktivists and security allies, including Ukraine’s “IT army,” to strike Russian sites, services and infrastructure as a counter to Kremlin’s military strikes. In messages posted on Telegram, the volunteer hacking group claimed that DDoS attacks have decimated several Russian sites and online portals.
Separately, a group of Belarusian hackers known as the Cyber Partisans stated they staged an attack on the country’s train network in an effort to disrupt Russian troop movements into Ukraine, while another group called AgainstTheWest_ said it was “standing against Russia” and that it breached a number of websites and corporations.
The Anonymous, for its part, also claimed responsibility for disrupting the websites of state news agencies RT, TASS, and RIA Novosti, as well as websites of newspapers Kommersant, Izvestiya, and Forbes Russia magazine and the Russian oil giant Gazprom.
If anything, the rapidly evolving cyber war appears to have put other groups on alert, what with LockBit ransomware operators posting a neutral message, stating “For us it is just business and we are all apolitical. We are only interested in money for our harmless and useful work. “
The string of “crowd sourced attacks” by vigilante hacker groups amidst intensifying Russian military attack on Ukraine presents a “new risk of crisis escalation,” Matt Olney, director of threat intelligence and interdiction at Cisco Talos, said.
” The last seven days have seen a wild mix of government agencies, freelancers and semi-legitimate hackers. These people are all motivated by righteous nationalistic anger. “Governments are seeking volunteers to conduct cyberattacks against the opposition. As hostile spillovers are possible, this poses a significant global threat. “